cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282370070808
Journal Mail Official
mesran.skom.mkom@gmail.com
Editorial Address
Jalan sisingamangaraja No 338 Medan, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Computing and Informatics Research
ISSN : -     EISSN : 2808375X     DOI : -
Core Subject : Science,
Fokus kajian Journal of Computing and Informatics Research mempublikasikan hasil-hasil penelitian pada bidang informatika, namun tidak terbatas pada bidang ilmu komputer yang lain, seperti: 1. Kriptografi, 2. Artificial Intelligence, 3. Expert System, 4. Decision Support System, 5. Data Mining, dan lainnya.
Articles 5 Documents
Search results for , issue "Vol 1 No 3 (2022): July 2022" : 5 Documents clear
Kompresi Video Digital Menggunakan Metode Embedded Zerotree Wavelet (EZW) Rosdelima Parapat
Journal of Computing and Informatics Research Vol 1 No 3 (2022): July 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (380.306 KB) | DOI: 10.47065/comforch.v1i3.320

Abstract

In the era of technology in the field of multimedia, especially in processing moving images or often called digital video, it is very fast and competes in image and sound quality. Video files in MP4 format are very widely used today on social media which results in little storage space remaining in memory. Data compression is a process that can convert an input data stream (original data) into another data stream (compressed data) which has a smaller size. The compression process is the process of reducing the size of a data to produce a digital representation that is dense or compact but can still represent the quantity of information contained. Digital video is a computer file that is used to store a collection of digital files such as video, audio, metadata, information, chapter divisions, and titles at once, which can be played or used through certain software on a computer. There are many data compression methods currently available, but in this study the working principle of the EZW method will be discussed. The Embedded Zerotree Wavelet (EZW) method is an image compression algorithm that is simple, very effective, has properties where the bits in the bit stream are sorted according to their importance and produces a fully embedded code
Penerapan Metode Data Mining C4.5 dalam Penentuan Kelayakan Rehabilitas Rumah Warga Aulia Sugarda; Saifullah; Jalaluddin; Agus Perdana Windarto; Wendi Robiansyah
Journal of Computing and Informatics Research Vol 1 No 3 (2022): July 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (525.67 KB) | DOI: 10.47065/comforch.v1i3.321

Abstract

The purpose of the study was to find out which houses deserve to be rehabilitated in Pematang Dolok Kahean Village. The source of the data used in this research is using datasets that already exist in Pematang Dolok Kahean Village. The solution given is to classify the feasibility level of residents' houses using the C4.5 data mining method and using the Rapidminer software assistance. This method was chosen because it is one of the most widely used decision tree methods to predict a case. The results of the study stated that the system's accuracy value was 83.33% using split validation where this method produced several rules that could be used in determining the feasibility of the rehabilitation of residents' houses so that government subsidies could be channeled appropriately.
Modifikasi Algoritma Vigenere Cipher dengan Pembangkit Kunci Random Number Generator Dalam Pengamanan Citra Digital Shafira Amalia Zebua
Journal of Computing and Informatics Research Vol 1 No 3 (2022): July 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (762.623 KB) | DOI: 10.47065/comforch.v1i3.345

Abstract

Digital image is an image that can be processed by a computer. Digital images that are not allowed to be known by others or are said to be private and are not allowed to be manipulated by other irresponsible parties. The act of manipulating, hijacking or tapping the image will cause harm to the owner of the image. The technique to reduce these actions is to use cryptographic techniques. Cryptographic techniques are very well known for securing information with a password that only the owner of the image understands. To strengthen the results of the encryption carried out by the Vigenere Cipher Algorithm, modifications are made to the Random Number Generator. The Random Number Generator used is Linear Congruent Generator which has linear recursive properties combined with modulus. So the combination of vigenere cipher with random number generator Linear Congruent Generator is very difficult for other parties to abuse the image
Kompresi File Teks dengan Menggunakan Kombinasi Squitur dan Elias Gamma Code Tulus Fransius Silaban
Journal of Computing and Informatics Research Vol 1 No 3 (2022): July 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (348.752 KB) | DOI: 10.47065/comforch.v1i3.346

Abstract

Text files have a large size that affects the storage space and the sending process. This size is a factor in how much storage space will be used and how long it will take to send files. The longer the text, the larger the size. Large sizes can be overcome by doing the compression process. Compression is done to reduce the size of a file. Compression algorithms that can be used are sequitur algorithm and elias gamma code algorithm. The advantage of the sequitur algorithm is to replace 2 characters side by side with 1 terminal character in the character set, while the advantage of the elias gamma code algorithm is to replace the initial bit of the character with a gamma elias code bit. The two algorithms will be combined to produce a smaller size than the previous one
Perancangan Aplikasi Duplicate Image Scanner Menerapkan Algoritma MD5 Gaberia Sanchia Melati BR Lumbantoruan
Journal of Computing and Informatics Research Vol 1 No 3 (2022): July 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (363.257 KB) | DOI: 10.47065/comforch.v1i3.347

Abstract

Currently we are in the era of the digital world, there are lots of equipment that have tools to record photos in the form of cameras found on smartphones. The weakness of smartphones is the small storage space, so users must be good at managing files stored on the smartphone. There are so many applications in smartphones that provide facilities for sharing images. This of course will greatly burden the storage space of the smartphone because it stores image files which are generally large in size, especially if the image files are the same or duplicate, of course it is very burdensome for storage space. It will be very difficult to distinguish an image file without looking at the contents of the image file. So if you want to distinguish one image file from another, the user must see the contents of the image file and this will certainly be very difficult. For that we need a method that can be used to identify the same image file or duplicate image files so that a decision can be made to delete the duplicate document files so as to save storage space. In cryptography there is a hash function which is a one-way function that can generate the identity of a file, where if the image file contains the same content, it will produce the same hash value. It can be used to identify the same or duplicate image files. In the hash function there is the MD5 method or Message Digest 5 which is one of the hashing algorithms that is often used to encrypt data with a length of 128 bits. By applying this algorithm to the file scanner application, the results of the image file search are grouped based on the same hash value and users can make it easier and faster for users to delete duplicate image files without having to open and view the contents of the file

Page 1 of 1 | Total Record : 5