cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
ijics.stmikbudidarma@gmail.com
Editorial Address
Jalan Sisingamangaraja No. 338, Simpang Limun, Medan, Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
The IJICS (International Journal of Informatics and Computer Science)
ISSN : 25488449     EISSN : 25488384     DOI : https://doi.org/10.30865/ijics
The The IJICS (International Journal of Informatics and Computer Science) covers the whole spectrum of intelligent informatics, which includes, but is not limited to : • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High Performance Computing • Information storage, security, integrity, privacy and trust • Image and Speech Signal Processing • Knowledge Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles 93 Documents
Sequitur Algorithm For Particular Character Compression Or Words Always Returned Efori Buulolo
The IJICS (International Journal of Informatics and Computer Science) Vol 1, No 1 (2017): March 2017
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (311.835 KB) | DOI: 10.30865/ijics.v1i1.344

Abstract

Character pairs or recurrent words are often found on large documents. The document uses a large space in storage. At this time the storage with a large amount of space is not a problem anymore, with the availability of various media types of large data storage media and the price is very affordable. Although in the form of storage media is not a problem but in the storage and transmission of data, a large document would need an efficient for storage space and so does the case of data transmission. The Sequitur algorithm is one suitable algorithm for concluding context-free grammar into a compression to reduce repetitive input. The Sequitur algorithm is perfect for large document compression with paired or repeated characters so that the document uses more efficient storage space in the case of data transmission
Application Of Boyer Moore Algorithm for Text Searching Fince Tinus Waruwu
The IJICS (International Journal of Informatics and Computer Science) Vol 1, No 1 (2017): March 2017
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (254.52 KB) | DOI: 10.30865/ijics.v1i1.385

Abstract

Technology at the moment is very rapid development in business, and education. Many developers or application makers are competing in improving science about the science of technology so as not to miss. Technology is an integral part of human life. Computer application is one part that is not separated from the computer. An application is a software that actually works to simplify the job. Thus, at this time already many computer applications are created. In the course, the application software always experienced improvements made by the manufacturer. These improvements lead to improved facilities to make it easier for users to work. In the world of education or the world of work a lot of work done by using computers such as typing by using text editor applications such as Microsoft Word in the manufacture of scientific work or other work, often mistakes in terms of writing words, often mistakes occur not because of intentional but because of community habits In abbreviating words when writing. It is necessary an application that can facilitate the examination of a writing in order to find the wrong word or abbreviated and automatically the application will fix it (text improvement). To make it easier to find the wrong word in the application, it needs string matching technique using Boyer Moore algorithm. The application is built with Microsoft Visual Studio 2008 and MySQL as the. 
Russel Approximation Method And Vogel’s Approximation Method In Solving Transport Problem Nelly Astuti Hasibuan
The IJICS (International Journal of Informatics and Computer Science) Vol 1, No 1 (2017): March 2017
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (370.186 KB) | DOI: 10.30865/ijics.v1i1.454

Abstract

Transportation problems can be regarded as one of the problems that occur routinely in a company in the process of distributing products from several sources to certain places. Transportation issues are included in one of the optimization issues in operations research aimed at minimizing transportation costs. Differences in transportation costs can be due to several factors such as distance gap, type of transport used and other things. The optimization of transportation cost can be done by using Vogel Approximation method and Russel Approximation Method. Method. To see the effectiveness of optimization conducted by the two methods is needed a comparison process.
Image Scrambling Using One Time Pad with Linear Congruent Key Generator Imam Saputra
The IJICS (International Journal of Informatics and Computer Science) Vol 1, No 1 (2017): March 2017
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (445.148 KB) | DOI: 10.30865/ijics.v1i1.525

Abstract

With the changing of the times, more and more moments can be photographed. Digital imagery stores a lot of information through visual display. Many people perpetuate the things that are personal in the form of digital imagery, with so many files in the form of digital imagery that is private and not for publication. With the development of cloud computing systems, every image recorded through the smartphone will be synchronized with the online storage service provider. This has many advantages, such as users do not have to worry about the damage to storage devices that exist in their gadgets. But the disadvantage of this system is that if an account falls into the hands of an unauthorized person then photographs containing this personal information may be published by an unauthorized person, of course this will be very detrimental. One solution that can be used is to randomize the original image so that its visual appearance will not be like the actual visual display. One way that can be used for image randomization is by cryptographic techniques. The one time pad algorithm is a very powerful classical cryptographic algorithm and can not be solved by cryptanalis until now. One disadvantage of a one time pad algorithm is the key length must be the same as the length of the plaintext. This makes the algorithm unused because it is less practical in its key usage. To overcome this required a key generator that could generate randomly generated locks ie a linear congruent generator, thus the key length must be equal to the length of the plaintext can be generated only with a few variables. In this way, image randomization can be done with a strong and practical cryptographic algorithm.
Decision Support System In Sous Chef De Partie Selection Using Simple Method Additive Weighting (SAW) (Case Study: Restaurant Goela Batoe) Iwan Setia Budi; Muhammad Syahrizal
The IJICS (International Journal of Informatics and Computer Science) Vol 1, No 2 (2017): September 2017
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (304.36 KB) | DOI: 10.30865/ijics.v1i2.1349

Abstract

The SAW method is also known as the weighted addition method. The basic concept of the SAW method is to find the weighted sum of the performance ratings on each alternative of all attributes. The SAW method requires the decision matrix normalization process (X) to a scale that can compare with all available alternative ratings.
Implementation of Computer Based Systems as Efficiency of Manager Decisions in Employee Reward Maringan Sianturi
The IJICS (International Journal of Informatics and Computer Science) Vol 1, No 2 (2017): September 2017
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (220.638 KB) | DOI: 10.30865/ijics.v1i2.1374

Abstract

The purpose of this study is to provide support to management in determining employees who are entitled to employee reward based on competence using a computer-based system. Rewards for employees are aimed at motivating employees. The method used is the Preference Selection Index (PSI), which has the advantage of being able to produce criteria weight values without identifying using the weighting method.
Application Of Weight Sum Model (WSM) In Determining Special Allocation Funds Recipients Dikki Handoko; Mesran Mesran; Surya Darma Nasution; Yuhandri Yuhandri; Heri Nurdiyanto
The IJICS (International Journal of Informatics and Computer Science) Vol 1, No 2 (2017): September 2017
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (461.472 KB) | DOI: 10.30865/ijics.v1i2.528

Abstract

In the management of education is not uncommon educational institutions sometimes receive sources of funds from outside, one of which comes from the Department of Education in the implementation of its duty to provide one allocation of funds called Special Allocation Fund (DAK). This assistance is from APBN revenues to areas devoted to schools to help fund special activities such as the addition or improvement of school facilities and infrastructure. The application of this special allocation grantee needs to use a Decision Support System (CMS) to allow decisions to be generated in favor of the DAK beneficiary. In the application of SPK required MCDM method, the Weight Sum Model (WSM), which is a simple method and able to generate ranking from the proposer alternatives in a special allocation fund.
Implementing Forward, Backward Chaining and Certainty Factor in Responsive Web-Based Expert System of Cow Disease Rizki Wahyudi; Wisnu Dwi Prasetyo
The IJICS (International Journal of Informatics and Computer Science) Vol 2, No 1 (2018): March 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (393.552 KB) | DOI: 10.30865/ijics.v2i1.816

Abstract

This research aims to design and build expert systems of cow disease to assist farmers in identifying cattle diseases. A large number of cattle in Banyumas is not matched by the number of veterinarians, the Department of Fisheries and Livestock (DINKANAK). Banyumas records 961 cases of sick cows in 2016. This expert system is expected to assist cattle ranchers to identify cow disease and symptom-based remedies illness-symptoms. By using Inference Forward and Backward chaining which is a search method or tracking technique by using information from breeders, and Certainty Factor is used to accommodate the uncertainty of thinking of a data expert that is Doctor the process of extracting knowledge by interview. In this research system development using ESDLC (Expert System Development Life Cycle) with stages of Planning, Knowledge Acquisition, Implementation, and Evaluation. Testing is done with two approaches are Alpha Testing and Beta Testing. Alpha Testing conducted on the developer side to test the functional system using Black Box Testing method result all functional system can function well. Beta Testing is aimed at user acceptance by a Questionnaire method yields an average score of 76% or usability and the quality of system information is easy to understand.
The Application of The Nearest Neighbor Algorithm in Detecting Appendicitis Disease Sari Handayani; Nelly Astuti Hasibuan; Putri Ramadhani
The IJICS (International Journal of Informatics and Computer Science) Vol 2, No 1 (2018): March 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (236.402 KB) | DOI: 10.30865/ijics.v2i1.817

Abstract

The expert system is a branch of artificial intelligence that facilitates the knowledge of an expert into an application that can be used to help the work of experts. The knowledge base is formed by an inference engine that translates an expert's knowledge. The result or output of the expert system can not guarantee its certainty. Therefore, it takes several methods that can be used to solve it. In this study, expert systems are applied to the medical or medical world. The following are related to the medical appendicitis disease or better known as appendicitis.Method used to improve the accuracy of the decision of the nearest neighbor algorithm. The nearest neighbor algorithm is an approach to finding a case with proximity or similarity between a new case and an old case. The results of this study is an engineering inference expertise with the aim to obtain clinical decisions of appendicitis diseases on the user (user) as medical treatment as early as
Implementation of Base64 Algorithm for Securing SMS on Smartphones Ros Minarni
The IJICS (International Journal of Informatics and Computer Science) Vol 2, No 1 (2018): March 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (176.838 KB) | DOI: 10.30865/ijics.v2i1.819

Abstract

In this study the authors used the base64 algorithm, the Base64 algorithm is one algorithm for encoding and decoding a data using the ASCII format, which is based on 64 base numbers or can be said to be one of the methods used to encode (encode) binary data. The results obtained from the ROSMINARNI text message example were encoded with base64 into Uk9TTUlOQVJOSQ, the application of the Base64 algorithm to secure sms messages was done by creating a cryptographic application with the help of the Java Android programming language, the process of securing SMS messages using the Base64 algorithm can run well and produce difficult ciphertext known by ordinary people

Page 1 of 10 | Total Record : 93