cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
jurikom.stmikbd@gmail.com
Editorial Address
STMIK Budi Darma Jalan Sisingamangaraja No. 338 Simpang Limun Medan - Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
JURIKOM (Jurnal Riset Komputer)
JURIKOM (Jurnal Riset Komputer) membahas ilmu dibidang Informatika, Sistem Informasi, Manajemen Informatika, DSS, AI, ES, Jaringan, sebagai wadah dalam menuangkan hasil penelitian baik secara konseptual maupun teknis yang berkaitan dengan Teknologi Informatika dan Komputer. Topik utama yang diterbitkan mencakup: 1. Teknik Informatika 2. Sistem Informasi 3. Sistem Pendukung Keputusan 4. Sistem Pakar 5. Kecerdasan Buatan 6. Manajemen Informasi 7. Data Mining 8. Big Data 9. Jaringan Komputer 10. Dan lain-lain (topik lainnya yang berhubungan dengan Teknologi Informati dan komputer)
Articles 9 Documents
Search results for , issue "Vol 7, No 4 (2020): Agustus 2020" : 9 Documents clear
Penerapan Metode Critical Path Method (CPM) Pada Network Planning Dalam Efisiensi Waktu dan Biaya Proyek Pembangunan Rumah Minimalis (Studi Kasus: Property Group Medan) NST, Deni Prawira
JURIKOM (Jurnal Riset Komputer) Vol 7, No 4 (2020): Agustus 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v7i4.2266

Abstract

Along with developments in the industrial world, as well as property developments, especially in the construction of rapidly increasing homes, the level of difficulty and managing a home project is higher. The higher the level of difficulty, means the longer duration of time needed to complete the project. In a project the longer the duration required, the greater the automatic costs and vice versa if the duration of work needed is small, the costs required are also small. Network planning (network planning) in principle is a dependency relationship between the parts of the work that are described or visualized in a network diagram. The problem with the Property Group in the construction of minimalist houses is that the estimated duration of the project is not timely completion because the data created from the office sometimes does not match the data in the field. To overcome the problem regarding the estimated time in project completion, the Critical Path Method (CPM) method is used. So it is very necessary a time management (Time Management) to streamline the time of a project which in addition to sharpening priorities, also striving to improve the efficiency and effectiveness of project management in order to achieve maximum results from available resources. All of these achieve the goal of a home construction project that is success that meets the criteria of time (schedule) as well as cost (budget) and quality (quality). In addition to time management, of course also must be followed by a good project implementation and in accordance with planning. With good time management and implementation, the risk of a minimalist home construction project will experience a smaller delay.
Prediksi Perkembangan Jumlah Pelanggan Listrik Menurut Pelanggan Area Menggunakan Algoritma Backpropagation Saragih, Irfan Christian; Hartama, Dedy; Wanto, Anjar
JURIKOM (Jurnal Riset Komputer) Vol 7, No 4 (2020): Agustus 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v7i4.2291

Abstract

Electricity is one of the vital needs of humanity. Without electricity, it is certain that the wheels of the economy will not be able to run properly. So that electricity customers are increasingly increasing, as they increase the needs and population of the community. Therefore this study aims to determine the development of the number of electricity customers using the backpropagation algorithm. The research data used was electricity customer data by area (customer) in North Sumatra in 2013-2017, obtained from the Central Statistics Agency of North Sumatra. This study uses 5 architectural models, namely 4-2-1, 4-3-1, 4-4-1, 4-5-1, and 4-6-1. Of the five architectural models used, one of the best architectural models is obtained 4-4-1 with an accuracy rate of 88%, epoch 716 iterations in a short amount of time, 15 seconds, with MSE Training 0,00099763 and MSE testing 0.00109935. Based on the best architectural model, this will be used to predict the Development of Electricity Customers by Area Customers in North Sumatra from 2018 to 2020
Klasifikasi Menggunakan Algoritma C4.5 dalam Memprediksi Kriteria Nasabah Pembiayaan Syariah BMT 071 M. Wahyu Santoso
JURIKOM (Jurnal Riset Komputer) Vol 7, No 4 (2020): Agustus 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v7i4.2307

Abstract

As it is known that one of the tasks of the Financing field is to analyze customer data in a cooperative to find out which customers have the potential to be able to do credit again. The method that can be used to analyze existing customer data is by classifying all customers who have made or completed their financing installments into subsequent marketing targets. That is why this research was conducted to help resolve the above problems by designing a data mining application that can serve to predict the criteria of loan fund customers who have the potential to borrow funds back to the BMT 071. Financing Section of BMT 071 located in Central Kalimantan, Regency Kotawaringin Timur is a place chosen by researchers as a case study, assuming the BMT 071 Financing Section has experienced problems as explained above. Therefore, the authors use data mining techniques that are applied to the application to be built is the Decision Tree classification technique. As for the algorithm used as a helper algorithm to form a decision tree is the C4.5 Algorithm. For the dataset processed in this study is the installment data for BMT 071 financing customers from August 2018 to March 2020 in Microsoft Excel format. The results of this study are a design application that can facilitate the Financing section of the BMT 071 in obtaining financing targets in the future
Sistem Pakar Mendiagnosa Penyakit Skizofrenia Menerapkan Metode Certainty Factor Cynthia Silaban; Nelly Astuti Hasibuan
JURIKOM (Jurnal Riset Komputer) Vol 7, No 4 (2020): Agustus 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v7i4.2265

Abstract

The development of technology is currently very rapid, so the development of these technologies is very beneficial in all fields including health. In today's case there are a lot of things that are detrimental to others even yourself. Where the case can occur self harm to the loss of level of awareness in controlling emotions. The purpose of this study is to diagnose schizophrenia and provide solutions to the conditions experienced through the application of an expert system. The Certainty Factor method can make diagnosing easier and provide a more accurate diagnosis based on previous events and can be revised again in solving new problems. Based on the results of testing with a comparison between the results of diagnosis the system has the ability to solve problems from patients by getting results so that the system can be said to be feasible to use.
Sistem Pendukung Keputusan Menentukan Diskon Biaya Perawatan Rumah Sakit Deli Menggunakan Metode TOPSIS Didi Prawira Suprayogi; Muhammad Syahrizal
JURIKOM (Jurnal Riset Komputer) Vol 7, No 4 (2020): Agustus 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v7i4.2275

Abstract

Decision support system is a computer-based system that functions for decision making by utilizing data and models to solve unstructured and semi-structured problems within a company or organization. Deli Medan Hospital is one hospital that offers quality health services accompanied by competitive prices. The price offered by Deli Medan Hospital is in accordance with the quality of delivery provided so that the use of this hospital's health services is always a satisfaction. this can be seen from the number of patients who are still increasing every year Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) is one of the multicriteria decision making methods first introduced by Yoon and Hwang (1981). TOPSIS uses the principle that the chosen alternative must have the closest distance from the positive ideal solution and the farthest from the negative ideal solution from a geometric point of view using Euclidean distance to determine the relative proximity of an alternative to the optimal solution. Positive ideal solutions are defined as the sum of all the best values that can be achieved for each attribute, while the negative-ideal solution consists of all the worst values achieved for each attribute
Analisa Mobile Phishing Dengan Incident Response Plan dan Incident Handling Wenceslaus Candraditya Pamungkas; Fahmy Trimuti Saputra
JURIKOM (Jurnal Riset Komputer) Vol 7, No 4 (2020): Agustus 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v7i4.2304

Abstract

Tindakan kejahatan yang terjadi pada jaman modern ini semakin berkembang dan bermacam-macam, kejahatan yang terjadi saat ini juga sudah merambah kedunia maya, yang berupa kejahatan Phising, dimana korban akan dimintai informasi pribadi yang berkedok menggunakan web palsu yang sengaja disebar melalui jejaring sosial seperti email, chatting, broadcast, dll. Kejahatan ini akan memanfaatkan data dan informasi yang di dapatkan untuk melakukan tindak kejahatan yang dimana sang korban tanpa sadar menginputkan data pribadi mereka ke dalam web pancingan yang sengaja disiapkan dan  disebar, dimana data dan informasi tersebut menjadi salah satu akses untuk masuk ke dalam layanan yang korban miliki.Dengan menggunakan metode Incident Respon Plan (IRP) dan Incident Handling yang dimana membantu seseorang dalam melakukan perlindungan terhadap data pribadi yang dimiliki oleh setiap individu dan dimana kita sebagai pengguna selayaknya untuk dapat melindungi data dan informasi diri yang dimana menjadi akses untuk masuk kedalam layanan. Dengan IRP dan Incident Handling  seseorang akan mengetahui hal apa saja yang dapat dilakukan untuk melindungi setiap informasi yang ada, mulai dari persiapan sebelum terkena serangan phising ataupun jika kita sudah terkena serangan Phising.
Penerapan Algoritma AES dan DSA Menggunakan Hybrid Cryptosystem untuk Keamanan Data Suci Ramadani; Diana Diana; Siti Sauda
JURIKOM (Jurnal Riset Komputer) Vol 7, No 4 (2020): Agustus 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v7i4.2055

Abstract

Exchange of documents based on a computer such as exchanges of messages via email on the internet has been done as a commercial transaction. Although it looks practice but there are also so many negative impacts that occur. This is the message sent can be opened by anyone who has access to enter the email. So that it can lead irresponsible people to steal information of documents. To ensure the documents sent are authentic until the intended part, one way that can be done is to use cryptography. In this study applying cryptography of AES and DSA algorithms. AES algorithm is a symmetry key that is using the same key to process of encryption and decryption while DSA algorithm is an asymmetric key which is the process of encryption using a private key and using public key for decryption. Then use a hybrid algorithm to combine AES and DSA algorithm. The results of this study is an application of encryption and decryption with a success rate of 86% for file encryption and 83% for decryption. File size after encrypted has increased by 32% and return to its original size after decrypted
Investigasi Serangan Backdoor Remote Access Trojan (RAT) Terhadap Smartphone M. Alvian H Nasution; Agung Tri Laksono
JURIKOM (Jurnal Riset Komputer) Vol 7, No 4 (2020): Agustus 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v7i4.2301

Abstract

The Smartphone is one of the needs for everyone at this time, especially in terms of communication with others, but with the development of technology that is also increasingly sophisticated, sometimes we as users do not know there are crimes or attacks that can occur to our smartphone and threaten personal information or data self that is in it, especially android users, where on Android devices can be inserted a malware with the type of RAT or often we call the Remote Access Trojan which is deliberately made using ngrok tools, where the RAT can be made using various file extensions such as. jpg,. MP4, or .apk as was done and will be discussed in this journal. In this journal, an experiment will also be carried out planting RATs on a target, namely an android smartphone which will finally get full access from the smartphone to get full access to any directory that exists shortly after the installation of the RAT hidden in the .apk form file, besides that with this test it is expected that smartphone users, especially Android users, do not root privately, because by rooting the device can open a security hole of the device that we are using and it will be easier to attack from irresponsible parties
Perbandingan Metode Canny, Prewitt, dan Sobel Pada Image Jenis-Jenis Alga Untuk Mendeteksi Tepi Citra Ari Hidayat
JURIKOM (Jurnal Riset Komputer) Vol 7, No 4 (2020): Agustus 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v7i4.2263

Abstract

An image is a projection of a three-dimensional field into a two-dimensional surface. Scane is defined as a collection of geometric three-dimensional objects and is usually compiled based on physical by natural law, whereas, edge detection is part of image processing. Edge detection is the process of producing a boundary for an object in an image. Edge detection has several operators such as Canny, Prewitt and Sobel operators. The edge detection process in the image on the comparison of edge detection of images in algae images includes the canny, prewit and sobel methods, the first step we must do is to input the image, using photos of algae measuring 300x300 pixels. Image type of algae that will be inputted with bmp. After we input the image, the system will take the pixel value from Red, Green and Blue (RGB).

Page 1 of 1 | Total Record : 9