cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
jurikom.stmikbd@gmail.com
Editorial Address
STMIK Budi Darma Jalan Sisingamangaraja No. 338 Simpang Limun Medan - Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
JURIKOM (Jurnal Riset Komputer)
JURIKOM (Jurnal Riset Komputer) membahas ilmu dibidang Informatika, Sistem Informasi, Manajemen Informatika, DSS, AI, ES, Jaringan, sebagai wadah dalam menuangkan hasil penelitian baik secara konseptual maupun teknis yang berkaitan dengan Teknologi Informatika dan Komputer. Topik utama yang diterbitkan mencakup: 1. Teknik Informatika 2. Sistem Informasi 3. Sistem Pendukung Keputusan 4. Sistem Pakar 5. Kecerdasan Buatan 6. Manajemen Informasi 7. Data Mining 8. Big Data 9. Jaringan Komputer 10. Dan lain-lain (topik lainnya yang berhubungan dengan Teknologi Informati dan komputer)
Articles 16 Documents
Search results for , issue "Vol 5, No 6 (2018): Desember 2018" : 16 Documents clear
Implementasi Algoritma C4.5 Untuk Klasifikasi Tingkat Kepuasan Pembeli Online Shop Febriyanto, Dimas Bayu; Handoko, Lovi; Wahyuli, Wahyuli; Aisyah, Hanif; Rumini, Rumini
JURIKOM (Jurnal Riset Komputer) Vol 5, No 6 (2018): Desember 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (219.805 KB) | DOI: 10.30865/jurikom.v5i6.1000

Abstract

This study applies the C4.5 algorithm in deciding customer satisfaction. The type of this research is classification with the concept of data mining by involving as many as 100 data which then take a sample of 15 data consumers of Vector Polaroid & Gift Jogja categorized by satisfied and dissatisfied. The method used in this research is classification method Classification is the process of finding a collection of patterns or functions that describe and separate data classes from one another, to be used, to predict data that does not yet have a particular data class. The results of the study have an accuracy rate of 91%, with the value of precision at predictive satisfaction of 66.67% and the value of precision in predictions not satisfied at 33.3%
Implementasi Predictive Modelling Dalam Memprediksi Besarnya Penggunaan Listrik Rumah Tangga (Studi Kasus: PLN Area Lubuk Pakam) Iskandar, Ishak
JURIKOM (Jurnal Riset Komputer) Vol 5, No 6 (2018): Desember 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (330.766 KB) | DOI: 10.30865/jurikom.v5i6.1206

Abstract

The role of electricity is very important for every level of society and even electricity is very much needed as a means of production and for everyday life, so the importance of the role of electricity certainly has an impact on increasing electricity demand but this is not linear with electricity that has not been able to meet demand the electricity is so big. To overcome this, there needs to be interference from the government and the community in using electricity wisely so that the electricity needs do not become greater than the electricity supply. Therefore every household must understand effective electricity use. The observation method taken by the author is to collect and collect data from PT. PLN Lubuk Pakam Area. In addition, the author collects data from books related to the discussion that the author wants to describe and conduct research at PT. The Lubuk Pakam Area PLN is concerned with the discussion. The author also reads several journals concerned with the discussion material. The application of the Predictive Modeling method is expected to be able to predict the amount of electricity usage per household so that it is easier to regulate electricity usage. household electricity use tested by the Predictive Modeling method, the percentage results obtained for the accuracy of predictions, where the data on household electricity usage tested contained data on household electricity usage that were successfully classified correctly.
Analisa Unsharp Mask Filter Untuk Perbaikan Citra Pada Pas Foto Sari, Dewi Purnama
JURIKOM (Jurnal Riset Komputer) Vol 5, No 6 (2018): Desember 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (213.432 KB) | DOI: 10.30865/jurikom.v5i6.1210

Abstract

Currently, the use of digital cameras to capture images or photos is more than using a manual camera with film media. This is because digital image retrieval has many advantages, especially in terms of storage which no longer uses physical media (film) but uses digital media and a very long storage age of images without reducing the quality of the image. One damage that might occur is the blurred image (blurred image). This damage can be caused by several things including the age of the photo that has been long, and wet with water. The thing that can be done to avoid the occurrence of blurred images caused by old photographs is to treat the image state. But in reality, it is very difficult to treat the condition of this image. Several methods have been developed to improve blurred images, including using the deconvolution process for kernel blur, unsharp mask. In this study, an application was developed to make improvements to the blurred image caused by the age of the old photo using the unsharp mask method. Unsharp mask is one of the digital image processing methods that can be used to reduce the level of image blur caused by photo age and image maintenance errors. Unsharp word naming is because this method uses a more blurry image of the original image as a mask-making factor. After the mask is obtained, the mask will be added to the original image so that the image is sharper than the original image.
Implementasi Algoritma Greedy Pada Game Pacman Pamela Hapsari Putri; Muhammad Ridlo Arifandi; Edy Hardianto Rifeni; Fakhrur Wiradhika; Rumini Rumini; Anggit Dwi Hartanto
JURIKOM (Jurnal Riset Komputer) Vol 5, No 6 (2018): Desember 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (208.124 KB) | DOI: 10.30865/jurikom.v5i6.1001

Abstract

Pacman is an arcade game developed by Namco and released in Japan on May 22, 1980. Pac-Man, which is still popular today, has also been released on other platforms such as Game Boy and SNES. The designer of this game is Toru Iwatani, who is a Namco employee. The concept of the game in the Pacman game is very simple: Players must control the Pacman character to eat all the small dots and other special objects that are in the maze without being caught by 4 ghosts. The greedy algorithm is used to find the current shortest path from the position of the ghost character to the position of the Pacman character.
Penerapan Algoritma Fisher Yates Shuffle dan Linear Congruent Method Pada Simulasi Ujian Toefl Berbasis Android Fauji Ahmad
JURIKOM (Jurnal Riset Komputer) Vol 5, No 6 (2018): Desember 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (187.11 KB) | DOI: 10.30865/jurikom.v5i6.1212

Abstract

In facing global competition to enter institutions or companies, most companies or agencies apply various conditions to enter the agency or company, one of which is often used by large companies is to master English to communicate with the outside world. The number of Toefl questions that we can get from the internet or from Playstore like the Toefl simulation has the same sorting if made from the same Vendor. Then an Android-based Toefl simulation was made to randomize the sequence of questions if more than one person playing. For randomization of the sequence of questions, the author applies the Fisher-Yates Shuffle algorithm and Linear Congruent Method which have been proven to be able to randomize the questions well.
Implementasi Management QOS Bandwidth Untuk CCTV Menggunakan Metode Simple Queue Pada BSI Cibitung Lasman Effendi; Ridatu Oca Nitra; Muhammad Hilman Fakhriza
JURIKOM (Jurnal Riset Komputer) Vol 5, No 6 (2018): Desember 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (253.142 KB) | DOI: 10.30865/jurikom.v5i6.985

Abstract

The use of CCTV today is very important as a support for emergencies around the area of the company / building, and serves to assist officers in the building security room. In this case the function of CCTV only helps the officer to minimize the frequent crimes, not to reduce from the crime itself. CCTV itself only displays the image and save it in HDD to see the incident occurring in the hook. The more powerful the quality of CCTV itself is still many shortcomings that developed the resulting image quality, the area captured by the camera, therefore the supervisory function is still less effective and efficient for all things crime. In this research. By using remote monitoring using Pro Surveillance System application. To facilitate monitoring.
Implementasi Algoritma Prediction By Partial Matching (Ppm) Pada Kompresi File Teks Terenkripsi Elgamal Relina Hutagalung
JURIKOM (Jurnal Riset Komputer) Vol 5, No 6 (2018): Desember 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (353.438 KB) | DOI: 10.30865/jurikom.v5i6.1196

Abstract

Computer security is a branch of technology known as information security applied to computers. The goal of computer security is to protect information against information theft. The application of computer security is an effort made to secure performance and computerized processes so that they are not used, modified, interrupted and disturbed by unauthorized parties. While data compression is one of the important aspects of the development of information technology. Compression is converting data into forms that require fewer bits, usually done so that data can be stored or sent more efficiently. The speed in the process of sending information is something that is highly expected by using existing technology and will be hampered if the file containing the information has a large size. Not only kecepan, security factors are very important things in the exchange of information. This is because many irresponsible parties want to steal information and can be misused by that party. The compression technique using the Prediction by Partial Matching algorithm can overcome large file sizes because by using the algorithm the file size can be minimized. Whereas to improve the security of confidential information, then encoding text files using the ElGamal algorithm which has a level of security that is quite strong because of the difficulty in calculating discrete logarithms to solve them. The final result is a text file that has been encoded and has a smaller size.
Pengoptimalan Biaya Pengiriman Barang Pada PT. Nias Express Dengan Menggunakan Metode North West Cornerv Defriman Waruwu
JURIKOM (Jurnal Riset Komputer) Vol 5, No 6 (2018): Desember 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (145.836 KB) | DOI: 10.30865/jurikom.v5i6.1207

Abstract

PT. Nias Express is a company engaged in the delivery of goods. With the aim of providing servants to the owner of goods by guaranteeing the integrity and security of goods in the purpose of increasing the development of the company in the delivery of goods requires the company to be able to provide shipping services for consumers to support better shipping transactions. The Noerth west corner method is one method chosen by the author in solving problems that occur at PT. Nias Express, wherein the method, the calculation is done by starting from the edge to the fishery, using the need table and delivery table, so that optimization costs can be increased and not only when that is all, with the use of this method, the authors hope to increase service in shipping goods. Of the several problems that occur and are often experienced by PT. Nias Express is a cost that is unexpected, shipping and costs that are used in excess and uncontrolled expenditures used in shipping goods, with such problems, in need of systematic preparation in handling costs and shipping goods to arrive safely at destination.
Perancangan Aplikasi Terenkripsi Dengan Menerapkan Metode Secret Sharing Asmuth Bloom Evi Amelia Tarigan
JURIKOM (Jurnal Riset Komputer) Vol 5, No 6 (2018): Desember 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (196.686 KB) | DOI: 10.30865/jurikom.v5i6.1211

Abstract

Conventional cryptographic algorithms cannot be applied to solve a plaintext (message) into several ciphertext pieces because conventional cryptographic algorithms can only produce a ciphertext from a plaintext (message) In this case, cryptography can be applied, namely Asmuth-Bloom's secret sharing. The methodology used to analyze and design the Asmuth-Bloom secret sharing cryptographic application software is the Waterfall methodology. This research is intended to produce a learning software that is able to display work processes from Asmuth-Bloom's secret sharing and applications from Asmuth-Bloom's secret sharing. The working procedure described by the software includes the process of forming keys, the process of forming shadows and the process of combining shadow.
Sistem Pendukung Keputusan Penentuan Jurusan SMA Menggunakan Metode ELECTRE Rusito Rusito; Hendri Surjani
JURIKOM (Jurnal Riset Komputer) Vol 5, No 6 (2018): Desember 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (427.075 KB) | DOI: 10.30865/jurikom.v5i6.1007

Abstract

Student majors in secondary schools are not only determined by academic ability but must also be supported by interest factors, since the characteristics of a science demand the same characteristics of those who study them. In accordance with the applicable curriculum throughout Indonesia, the majors available in SMA include Natural Sciences (IPA), Social Sciences (IPS), and Linguistics. The majors will be tailored to the student's interests and abilities. The criteria for determining this department are based on the value of academic achievement, competency test scores and specialization. The number of students and various matapelajaran also affect the speed in determining student majors. In terms of selection of majors needs to be done with a mathematical method in order to run quickly and fairly, for example with the method of ELECTRE. The ELECTRE (Elimination Et Choix Traduisant la realitE) method is one of the most effective methods for MADM with qualitative and quantitative features. Looking from the above case then the author tries to solve the problem of selection with the model of Multi Attribute Decision Making (MADM). This research will apply an Electre method to address the determination of the majors quickly. This research uses Borg & Gall's method of research and development (1987). The results of this study is the results of expert system validation shows the value of 2.8 is between 2.51-3.25 which belongs to the category Valid and validation of the user shows the value of 3.22 is between 2.51 - 3.25 which belong to the category Effective .

Page 1 of 2 | Total Record : 16