cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282370070808
Journal Mail Official
mesran.skom.mkom@gmail.com
Editorial Address
Jalan sisingamangaraja No 338 Medan, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
KLIK: Kajian Ilmiah Informatika dan Komputer
ISSN : -     EISSN : 27233898     DOI : -
Core Subject : Science,
Topik utama yang diterbitkan mencakup: 1. Teknik Informatika 2. Sistem Informasi 3. Sistem Pendukung Keputusan 4. Sistem Pakar 5. Kecerdasan Buatan 6. Manajemen Informasi 7. Data Mining 8. Big Data 9. Jaringan Komputer 10. Dan lain-lain (topik lainnya yang berhubungan dengan Teknologi Informati dan komputer)
Articles 388 Documents
Pengendali Air Wudhu Otomatis Menggunakan Sensor Ultrasonik Berbasis Arduino Primatama Kurniandisyah; M Safii; Bahrudi Efendi Damanik; Dedy Hartama; M. Ridwan Lubis
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 1 No. 6 (2021): Juni 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Before performing prayers, Muslims must first take ablution water. So far, the provision of ablution water from mosques and prayer rooms is almost 100% using a faucet that is turned manually, sometimes it is troublesome and water is often wasted (wasteful). Therefore, the purpose of this research is to build a prototype automatic ablution water controller in the form of developing a system with an Arduino-based ultrasonic sensor. The tool that is built based on the prototype will be able to issue ablution water automatically and stop automatically, depending on the limb that is brought close to the end of the pipe that will discharge the water. This monitoring works by using an ultrasonic sensor, where the object under the sensor becomes the input. The ultrasonic sensor will be connected to the Arduino microcontroller which is useful for running this system, which provides information on the relay to activate the mini water pump and release water. So it can be concluded that this system is able to help control the use of ablution water to be more efficient.
Prototype Alat Pengamanan Pintu dengan Menggunakan Sensor Sidik Jari Berbasis Arduino Mega2560 Rudi Handika; Dedy Hartama; Ika Okta Kirana; M. Safii; Iin Parlina
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 1 No. 6 (2021): Juni 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The door is the most important and important part of a room to pay attention to its safety compared to other parts because it is from the door that everyone will enter or leave. This study aims to build a door security device using a Fingerprint sensor based on Arduino Mega 256. The door that will be given a security device is the door in classes at STIKOM Tunas Bangsa Pematangsiantar. This tool can be used as a security control system at the classroom door, users do not need to use manual security such as keys, and this tool is also equipped with an alarm as a marker when the Fingerprint sensor is accessed by someone who is not the owner, this alarm will sound. This system consists of hardware and Software. The hardware consists of an Arduino Uno, Fingerprint sensor, buzzer, Selenoid door, LCD and then the Software on this system uses the Arduino IDE program. This system runs if the Fingerprint sensor detects a finger from the user, the solenoid as a door lock will open. Otherwise, if the sensor does not see a finger from the user, the solenoid as a door lock will not open, and an alarm will sound. This door safety device can effectively be used as security on classroom doors and other rooms such as leadership rooms, education rooms and staff rooms
Sistem Pendukung Keputusan Pemilihan Peserta FLS2N SMAN 1 Perbaungan Menggunakan Metode MABAC Zulkarnain Zulkarnain; Yasir Hasan
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 2 No. 1 (2021): Agustus 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Selection of students of SMAN 1 Perbaungan to find out results that are balanced with the training that has been carried out at the school. SMAN 1 The previous comparison was not good, because there were still students or students who were dissatisfied with the results and there was an unrealistic impression. Besides that, SMAN 1 Perbaungan also had difficulty processing student data because there were only 8 students selected. For this reason, students and SMAN 1 Perbaungan want a more systematic selection process with the help of computerized calculation of decision support systems. The selection process for FLS2N SMAN 1 Perbaungan participants uses the MABAC method. The adoption of a decision support system and the MABAC method can help SMAN 1 Perbaungan in selecting FLS2N participants both systematically and with more realistic ranking results
Analisa Metode SHA224 Untuk Mendeteksi Orisinalitas Citra Digital Rusman Halawa
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 2 No. 1 (2021): Agustus 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In a digital image it is very important that the name of the authenticity of the data, given the data contained in it is very important and very confidential from parties who are not obliged to want to damage and change the information contained therein so it does not match what is expected. So, it is necessary to apply data security that can protect the data so that it cannot be manipulated or damaged any information contained in the data. Cryptography is the study of mathematical techniques related to aspects of information security such as data confidentiality, data integrity of data integrity, and data authentication. But not all aspects of information security can be solved by cryptography. Cryptography can also be interpreted as a science or an art to maintain message security. Some of the problems above that need to be considered and understood so that the system applied in accordance with what is desired by all parties. In digital images, the main thing that must be observed is to maintain the authenticity of digital images and improve the quality problems of digital images that you want to manipulate. With this research can overcome all the problems that occur about manipulating data from parties who are not obliged to the data From the above research the purpose of SHA224 is to secure a form of digital images that are still original that want to be manipulated by other parties. The image can be seen or manipulated anyone who has rights or obligations in the data or has no obligation at all, but when securing data using the SHA224 method, the data resulting from manipulation and original data will be detected and the results will be seen in fact. With the SHA224 method it can maintain the security and authenticity of digital images. In testing this can be done with the SHA224 method using the MATLAB application.
Implementasi Metode Enhanced Audio Steganogafi (EAS) Untuk Penyembunyian Text Terenkripsi Algoritma Gost Selamat G M Siregar
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 2 No. 1 (2021): Agustus 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Audio files in the Mp3 format are used as cover media. To be able to insert a secret message into the container media requires a method that can modify the object into a new object with confidential information in it without any noticeable changes from the initial object. The method used in this study is the EAS (Enhanced Audio Steganography) method and to encrypt the message using the GOST algorithm. EAS (Enhanced Audio Steganography) which is a method for inserting an encrypted message first to strengthen a secret message and then inserting it into an audio file. Encryption is done on the message using the GOST algorithm. The GOST method is a block cipher algorithm developed by a Soviet national. GOST is an abbreviation of "Gosudarstvennyi Standard" or "Government Standard". This algorithm is a simple encryption algorithm that has 32 rounds of processes and uses 64 bit block cipher with 256 bit keys. The GOST method also uses 8 different S-Boxes and XOR and Left Circular Shift operations. However, modifying audio file bits sequentially can create huge noise and invite suspicion for others that there is a message embedded in it. The method that is able to reduce the occurrence of noise in audio files after inserting a message is the EAS (Enhanced Audio Steganography) method. The EAS method is a modification of the LSB method. Where in the EAS method, the bytes that are used as containers only selective bytes, that is, the insertion of bits in the storage media is only done in blocks that are 254 or 255 bytes only, so that the storage media will not experience significant damage. The first input message format *. Doc or *. Pdf, will be encrypted using the Gost algorithm, the encryption process begins with input plaintext and key. After the message is encrypted then the embedding process uses the EAS method. Input audio file that will be used as a container, after that the encrypted file will be inserted in the audio file. In the embedding process, a large number of locations are available on the audio file. Audio files that are used as storage media must have a number of bytes worth 254 or 255 which are sufficient to hold the message file.
Penerapan Metode Vikor Dalam Pengambilan Keputusan Penunjukan Kader Pemberian Obat Pencegahan Massal Filariasi Studi Kasus Dinas Kesehatan Aceh Singkil Enci Manda Sari
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 2 No. 1 (2021): Agustus 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The Cadre Officer for the Provision of Mass Prevention of Drugs is an employee recruited from the Aceh Singkil Health Office, for the community, who is tasked with assisting the smooth running of health services. Filariasis is a negleted tropical disease (NTD) which has a severe impact on the patient because it causes disability. Because filariasis causes permanent disability and causes misery to the community, prevention is carried out by administering Filariasis Mass Prevention Drugs. Provision of Mass Prevention Drugs for filariasis is carried out by giving mass drugs once a year for five consecutive years by cadre officers for Mass Preventive Drug Administration. The problem in the formation of cadre officers so far is that the Aceh Singkil Health Service is still lacking, because so far the selection of cadres for Mass Prevention Drugs is still done manually by the committee in making decisions on cadres of giving Mass Prevention Drugs for Filariasis so that it can be fatal, because those who have been elected training was carried out by the Aceh Singkil Health Office so that when conducting training many were considered inappropriate. To overcome this problem, a decision was made by the cadre officer for the provision of Mass Prevention Drugs for Filariasis by using the computer-based Vikor method based on the criteria set by the Aceh Singkil Health Service so that in making decisions it does not result in errors and performance to select cadre officers for Mass Prevention Drugs. fast
Pengembangan Teknologi Tepat Guna Toko Bunga dengan Penerapan Metode CRM Toko Risky Flower Sampit Seprianson Eliyeser; Dwi Tjahjo Seabtian
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 2 No. 1 (2021): Agustus 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In today's technological era, the development of systems and information technology is very important. What is different from building a system is the function and requirements of the system itself. On the other hand, most people already use computer hardware that already has a system that can access all information quickly and precisely, most of them already have high specifications that can provide information faster when the user needs the information to be used, then the system user it will be easier to do. Risky Flower is a shop that provides several types and sizes of flower boards for parties and events to suit their individual needs. Orders made so far are still not fast because it takes a very long time, where customers must communicate directly to the place of sale of the flower board by choosing the type and size that will be used for the event to be held according to customer needs. With the existence of a system, it is hoped that it can help the process of ordering flower boards and can provide information about what customers will need in making their choices quickly without having to go to the place where the flower board is sold. The proposed system fully uses the web-based Customer Relationship Management (CRM) method.
Sistem Informasi Penentuan Rute Pengiriman Barang di CV ASA Menggunakan Metode Algoritma Genetika Aditya Pratama Putra; Selviana Yunita
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 2 No. 1 (2021): Agustus 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Transportation is a problem that is often faced by companies in distributing their products. This problem relates to the decision making of product distribution routes that optimize the distance traveled, travel time, travel costs, number of vehicles operated, and other available resources. CV ASA is a company engaged in the distribution of goods which is addressed at Jalan Raya By Pass KM 4,4 Sampit City. The product distribution process carried out by the company is by taking orders. CV ASA stipulates the minimum use of transport capacity is 50% - 60%, but there are still 18 of the 35 travel routes with vehicle capacity usage that is less than 50%, which ranges from 9% to 49%. The problem that occurs in the company is a problem from the Capacitated Vehicle Routing Problem (CVRP) whose initial solution was solved using the Saving Matrix Method and then repaired with Genetic Algorithms
Analisa Data Kepuasaan Siswa Dalam Pembelajaran Online Menggunakan Metode Service Quality Ika Ardias Nursinta; Besus Maula Sulthon
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 2 No. 1 (2021): Agustus 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The student's satisfaction in this covid-19 era is crucial to figuring out what level of quality services are available in school institutions. The study aims to find out the students' level of satisfaction with online study at SMK al - amanah, this study is a descriptive quantitative study with a population of 102. In this matter student satisfaction will be measured using a servqual and importance performance analysis method in this case where it talks about dimensions of waited, responsiveness, assurance, anticipation and tangibles. The instrument of this study is done with the interview manner and the dissemination of the questionnaire. The data of the collected questionnaires are calculated and prepared, and the quality of the service is specifically known. With the spread of the questionnaire, it can be seen the result of a student's dissatisfaction with the service given. Data prepared for servqual methods with the help of SPSS 24.0 and importance performance analysis. The results from the selected student satisfaction data can be used as an evaluation material for schools to improve online learning. The results of this study show every dimension on the servqual that is tangibles, valence, responsiveness, assurance, and emphaty. Indicating that the gap or responsive gap is the biggest quality value dimension of -0.72 and the smallest gap or gap there is in realibility of -0.22
Perancangan Aplikasi Kode Etik Profesi Dengan Menerapkan Algoritma Raita Yulytawaty Napitupulu
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 2 No. 2 (2021): Oktober 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Professional Code of Ethics is an ethical order that has been agreed upon by a certain community group. It can also be interpreted as a pattern of rules, procedures, signs, ethical guidelines in carrying out an activity or work. But in fact many professional actors do not know or care about the code of ethics of their own profession. The problem that occurs is that the professional code of ethics is generally written in a code of ethics book which is difficult to carry everywhere when compared to other books that are already application-based, either web-based or mobile-based. For this reason, with the application of this professional code of ethics, professional actors and the entire community can easily find out the desired professional code of ethics by searching for a professional code of ethics that has been determined according to the existing pattern. This professional code of ethics search application is designed using the string matching method. Application development uses the Unified Modeling Language (UML) planning method and is built on the android platform.

Page 4 of 39 | Total Record : 388