cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282370070808
Journal Mail Official
mesran.skom.mkom@gmail.com
Editorial Address
Jalan sisingamangaraja No 338 Medan, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Computing and Informatics Research
ISSN : -     EISSN : 2808375X     DOI : -
Core Subject : Science,
Fokus kajian Journal of Computing and Informatics Research mempublikasikan hasil-hasil penelitian pada bidang informatika, namun tidak terbatas pada bidang ilmu komputer yang lain, seperti: 1. Kriptografi, 2. Artificial Intelligence, 3. Expert System, 4. Decision Support System, 5. Data Mining, dan lainnya.
Articles 30 Documents
Kompresi Video Digital Menggunakan Metode Embedded Zerotree Wavelet (EZW) Rosdelima Parapat
Journal of Computing and Informatics Research Vol 1 No 3 (2022): July 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (380.306 KB) | DOI: 10.47065/comforch.v1i3.320

Abstract

In the era of technology in the field of multimedia, especially in processing moving images or often called digital video, it is very fast and competes in image and sound quality. Video files in MP4 format are very widely used today on social media which results in little storage space remaining in memory. Data compression is a process that can convert an input data stream (original data) into another data stream (compressed data) which has a smaller size. The compression process is the process of reducing the size of a data to produce a digital representation that is dense or compact but can still represent the quantity of information contained. Digital video is a computer file that is used to store a collection of digital files such as video, audio, metadata, information, chapter divisions, and titles at once, which can be played or used through certain software on a computer. There are many data compression methods currently available, but in this study the working principle of the EZW method will be discussed. The Embedded Zerotree Wavelet (EZW) method is an image compression algorithm that is simple, very effective, has properties where the bits in the bit stream are sorted according to their importance and produces a fully embedded code
Penerapan Metode Data Mining C4.5 dalam Penentuan Kelayakan Rehabilitas Rumah Warga Aulia Sugarda; Saifullah; Jalaluddin; Agus Perdana Windarto; Wendi Robiansyah
Journal of Computing and Informatics Research Vol 1 No 3 (2022): July 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (525.67 KB) | DOI: 10.47065/comforch.v1i3.321

Abstract

The purpose of the study was to find out which houses deserve to be rehabilitated in Pematang Dolok Kahean Village. The source of the data used in this research is using datasets that already exist in Pematang Dolok Kahean Village. The solution given is to classify the feasibility level of residents' houses using the C4.5 data mining method and using the Rapidminer software assistance. This method was chosen because it is one of the most widely used decision tree methods to predict a case. The results of the study stated that the system's accuracy value was 83.33% using split validation where this method produced several rules that could be used in determining the feasibility of the rehabilitation of residents' houses so that government subsidies could be channeled appropriately.
Modifikasi Algoritma Vigenere Cipher dengan Pembangkit Kunci Random Number Generator Dalam Pengamanan Citra Digital Shafira Amalia Zebua
Journal of Computing and Informatics Research Vol 1 No 3 (2022): July 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (762.623 KB) | DOI: 10.47065/comforch.v1i3.345

Abstract

Digital image is an image that can be processed by a computer. Digital images that are not allowed to be known by others or are said to be private and are not allowed to be manipulated by other irresponsible parties. The act of manipulating, hijacking or tapping the image will cause harm to the owner of the image. The technique to reduce these actions is to use cryptographic techniques. Cryptographic techniques are very well known for securing information with a password that only the owner of the image understands. To strengthen the results of the encryption carried out by the Vigenere Cipher Algorithm, modifications are made to the Random Number Generator. The Random Number Generator used is Linear Congruent Generator which has linear recursive properties combined with modulus. So the combination of vigenere cipher with random number generator Linear Congruent Generator is very difficult for other parties to abuse the image
Kompresi File Teks dengan Menggunakan Kombinasi Squitur dan Elias Gamma Code Tulus Fransius Silaban
Journal of Computing and Informatics Research Vol 1 No 3 (2022): July 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (348.752 KB) | DOI: 10.47065/comforch.v1i3.346

Abstract

Text files have a large size that affects the storage space and the sending process. This size is a factor in how much storage space will be used and how long it will take to send files. The longer the text, the larger the size. Large sizes can be overcome by doing the compression process. Compression is done to reduce the size of a file. Compression algorithms that can be used are sequitur algorithm and elias gamma code algorithm. The advantage of the sequitur algorithm is to replace 2 characters side by side with 1 terminal character in the character set, while the advantage of the elias gamma code algorithm is to replace the initial bit of the character with a gamma elias code bit. The two algorithms will be combined to produce a smaller size than the previous one
Perancangan Aplikasi Duplicate Image Scanner Menerapkan Algoritma MD5 Gaberia Sanchia Melati BR Lumbantoruan
Journal of Computing and Informatics Research Vol 1 No 3 (2022): July 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (363.257 KB) | DOI: 10.47065/comforch.v1i3.347

Abstract

Currently we are in the era of the digital world, there are lots of equipment that have tools to record photos in the form of cameras found on smartphones. The weakness of smartphones is the small storage space, so users must be good at managing files stored on the smartphone. There are so many applications in smartphones that provide facilities for sharing images. This of course will greatly burden the storage space of the smartphone because it stores image files which are generally large in size, especially if the image files are the same or duplicate, of course it is very burdensome for storage space. It will be very difficult to distinguish an image file without looking at the contents of the image file. So if you want to distinguish one image file from another, the user must see the contents of the image file and this will certainly be very difficult. For that we need a method that can be used to identify the same image file or duplicate image files so that a decision can be made to delete the duplicate document files so as to save storage space. In cryptography there is a hash function which is a one-way function that can generate the identity of a file, where if the image file contains the same content, it will produce the same hash value. It can be used to identify the same or duplicate image files. In the hash function there is the MD5 method or Message Digest 5 which is one of the hashing algorithms that is often used to encrypt data with a length of 128 bits. By applying this algorithm to the file scanner application, the results of the image file search are grouped based on the same hash value and users can make it easier and faster for users to delete duplicate image files without having to open and view the contents of the file
Implementasi Algoritma RC4A Dalam Pengamanan Citra Digital Yanti Nur Iman Giawa
Journal of Computing and Informatics Research Vol 2 No 1 (2022): November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (422.655 KB) | DOI: 10.47065/comforch.v2i1.348

Abstract

Digital images that are private and confidential are very vulnerable to wiretapping by irresponsible parties, especially if the images are distributed via the internet. The act of theft and abuse of secret images of course can harm the image owner. One of the techniques to reduce the above problems is by using cryptographic techniques. Cryptographic techniques can secure images by means of digital image encryption by implementing the RC4A algorithm then using the initial keyword as input in the process carried out to generate new, more random keywords, based on the Key Schedule Algorithm. (KSA) and pseudo random generation algorithm (PRGA). To determine the comparison between the original image (PlainImage) and the original image (CipherImage), processing was carried out with MeanSquareError (MSE) and PeakSiqnalToNoiseRation (PSNR). The results of this study were digital images encrypted with the RC4A algorithm in terms of time differences and image results after encryption where the time used to encrypt is shorter than the description and the image results before encryption are not the same after encryption.
Perancangan Aplikasi Penyandian Agenda Pribadi Menggunakan Algoritma Kunci Public Elgamal Dharma Yudistira
Journal of Computing and Informatics Research Vol 2 No 1 (2022): November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (274.673 KB) | DOI: 10.47065/comforch.v2i1.349

Abstract

In this final project, an encryption is created that is integrated with the existing agenda encoding application to add security to the security process on the mobile device. By using the ElGamal encryption method, it is hoped that the encryption process carried out through mobile devices will be more secure. Because, there is a public key and a private key that is only known by the user. The resulting output is ciphertext which when the user wants to read it, it is necessary to carry out the decryption process. In addition, in the encryption process for the same plaintext, different ciphertexts are obtained, but in the decryption process, the same plaintext is obtained. Thus, making the agenda safer than before.
Implementasi Metode Aras Dalam Pengambilan Keputusan Untuk Pemilihan Inseminator Terbaik Ari Gunawan Rambe
Journal of Computing and Informatics Research Vol 2 No 1 (2022): November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (317.471 KB) | DOI: 10.47065/comforch.v2i1.378

Abstract

The success of inseminator officers is largely determined by the synergy of the roles and functions of each work unit at the Puskeswan Kota Subulussalam, as well as the activities of technical officers in the field. The role of inseminator officers is one of the main factors in the success of the program as measured by pregnancy and birth rates. Puskeswan, namely the Animal Health Center which provides services in the field of animal health in Subulussalam. The problem that occurs at the Subulussalam Health Center every year is to select the best inseminators to increase the appreciation of the performance of the inseminators, in selecting the best inseminators. still less effective. To overcome this problem, the authors want to select the best inseminator by implementing a decision support system by applying the ARAS method because this method is used for ranking so that the problem is more focused because it is based on predetermined criteria and weight values ​​so that it will get maximum results and produce better decisions. accurate in selecting the best inseminator at the Subulussalam Health Center
Kompresi File Advanced Audio Coding (AAC) Menggunakan Metode Lempel Ziv Oberhumer (LZO) Ginta Enjelita Purba
Journal of Computing and Informatics Research Vol 2 No 1 (2022): November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (385.851 KB) | DOI: 10.47065/comforch.v2i1.379

Abstract

In an age of increasingly sophisticated technology such as today. The need for greater storage capacity is responsible for the emergence of various compression techniques. The more file is stored, the greater the capacity. The enormous size of file results in an inefficient memory and slow-motion process of file transfer. Getting older file storage results in more and more file piling up. As technology progresses today. And thus, a growing ability to process file is utilizing a compression method that is expected to address the problem, it will be necessary to minimize storage by using Lempel Ziv Oberhumer methods to compress Advanced Audio Coding(AAC) files to narrow the size of the beets. So by applying an Lempel Ziv Oberhumer to compression the file could reduce storage capacity optimally.
Analisis Model Backpropagation Dalam Meramalkan Tingkat Penjualan Saldo “Link Aja” Dwi Findi Auliasari; Gita Febrianti; Agus Perdana Windarto; Dedy Hartama
Journal of Computing and Informatics Research Vol 2 No 1 (2022): November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (424.942 KB) | DOI: 10.47065/comforch.v2i1.382

Abstract

Analysis of a prediction (forecasting) is very important in a study, so that research becomes more precise and directed (Wanto and Windarto, 2017). As is the case in predicting the level of Link Aja's balance sales. This research is expected to be useful for an agency as one of the study materials in business development. A system to predict the level of sales of Link Aja balance at PT. Wahana Putra Yudha. Artificial Neural Network is a method that is able to perform a mathematical process to predict the level of sales of Link Aja Balance at PT. Wahana Putra Yudha. By using the backpropagation method, the previous data processing process is carried out which will be used as input to predict the sales level of Link Aja Balance. The data were taken from January 2021 to April 2022. January 2021 to August 2021 were used as training data, while September 2021 to April 2022 were used as test data. The training architecture model used to predict the sales level of Link Aja's Balance is: 4-2-1; 4-25-1; 4-50.1; 4-75-1; and 4-100-1. The best architecture is 4-50-1, the percentage result is 75% in each test

Page 2 of 3 | Total Record : 30