KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer)

Journal Information
ISSN / EISSN : 2597-4610 / 2597-4645
Published by: STMIK Budi Darma (10.30865)
Total articles ≅ 192
Filter:

Latest articles in this journal

KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), Volume 3; https://doi.org/10.30865/komik.v3i1.1636

Abstract:
Many hot medicine products are marketed to the public. Because many products are marketed, making people confused in choosing the best hot medicine in the best. Hot medicine in the most popular community means that the drug is the best medicine for the community. In this research, there are two main problems in the research that can be formulated, namely whether the use of the AHP method can make the decision to determine the heat medication in the most popular community and how to look for a hot medicine decision in the most popular community. Analytic Hierarchy Process (AHP) method is used to find the ratio scale, both from discrete and continuous pair comparisons. AHP decomposes complex multi-factor or multi-criteria problems into a hierarchy. Hierarchy is defined as a representation of a complex problem in a multi-level structure where the first level is the goal, followed by the level of factors, criteria, sub-criteria, and so on down to the last level of alternatives. Keywords: Decision Support System, Analytic Hierarchy Process Method, Internal Medicine
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), Volume 3; https://doi.org/10.30865/komik.v3i1.1571

Abstract:
The high development of knowledge and technology, especially in computer. Nowadays, the most media that are commonly used to learn how to shalat and it’s doa is book that included picture, even there is so many guide books to shalat, the willingness to shalat for children are still under- expectation. The previous learning media is ineffectiveTherefore, we will make learning media as interactive media which include the guide to shalat for children to learn about more interactive guide to shalat that more interested than it’s visual and to increase children’s interest to shalat. In this research, writers use SWOT analysis method.Using this analysis method, the result will be interactive media that will be applied toelectronic media such as computer and laptop. That will be title as “Yuk Belajar Shalat bersama Calief dan Ara”. This media will also provide using Poster, Flayer, X-Banner, Key Chain, Sticker, Mousepad, Coloring Book and Shalat Wears.Keywords: Prayer Guide, Interactive Media.
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), Volume 3; https://doi.org/10.30865/komik.v3i1.1581

Abstract:
Along with the development of technology at this time some programmers have found a solution to overcome the problem of storing important files that we worried about before the file security by making several applications that we often refer to as online file storage. Files saved to online file storage are usually document files and image files. However, the problem that arises is the image file has a large size and takes up large storage space and requires a long time in the process of exchanging data. To reduce the size of an image file compression techniques can be used. Compression is a way to compress data so that it only requires a smaller storage space so that it is efficient in storing or shortening time in exchanging information. Compression technique has several algorithms, in this study the authors used the Adaptive Arithmetic Coding algorithm. From the results of the study the authors managed to compress a color image file with jpg extension using the Adaptive Arithmetic Coding algorithm. The application produced in this research is a web designed using Dreamweaver CS5 and php programming language.Keywords: Compression, Adaptive Arithmetic Coding, DreamweaverCS5, PHP.
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), Volume 3; https://doi.org/10.30865/komik.v3i1.1605

Abstract:
Chat application allows easily users to exchange information in the form of text, images, video and audio. Information that is distributed can be either confidential or not confidential. However, at this time there is often attack on to information that is communicated through communication media such as chat, so that it is possible for other people to misuse the information. The use of algorithms from cryptographic techniques in securing distributed information. This research discusses how to use the cryptosystem pailler algorithm to secure digital images that are distributed through chat applications. This algorithm is very resistant to solving because n-residue class calculations are believed to be very difficult to compute, so as to maintain the security of images distributed through chat applications.Keywords: Cryptography, Paillier Cryptosystem, Chatting, Digital Image, Communication
, Putri Ramadhani
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), Volume 3; https://doi.org/10.30865/komik.v3i1.1582

Abstract:
Security of data stored on computers is now an absolute requirement, because every data has a high enough value for the user, reader and owner of the data itself. To prevent misuse of the data by other parties, data security is needed. Data security is the protection of data in a system against unauthorized authorization, modification, or destruction. The science that explains the ways of securing data is known as cryptography, while the steps in cryptography are called critical algorithms. At this time, there are many cryptographic algorithms whose keys are weak especially the symmetric key algorithm because they only have one key, the key for encryption is the same as the decryption key so it needs to be modified so that the cryptanalysts are confused in accessing important data. The cryptographic method of Word Auto Key Encryption (WAKE) is one method that has been used to secure data where in this case the writer wants to maximize the encryption key and description of the WAKE algorithm that has been processed through key formation. One way is to apply the algebraic pascal triangle method to maximize the encryption key and description of the WAKE algorithm, utilizing the numbers contained in the columns and rows of the pascal triangle to make shifts on the encryption key and the description of the WAKE algorithm.Keywords: Cryptography, WAKE, pascal
Dian Lestari Nasution
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), Volume 3; https://doi.org/10.30865/komik.v3i1.1566

Abstract:
Map images that are on Google Maps can also be screenshooted, when taking image maps / maps the image quality is not optimal, this is because the ability of the computer used to take the image does not support high graphics. This map image can be used as material for the purposes of work that uses images such as graphic design, namely printing.The ability of computers that do not support large graphics processing in getting a good image is not a major problem in image improvement. Because the image that is not maximized, its color elements can be manipulated with digital image processing techniques, one of the methods for manipulating elements of image colors is the CLAHE method. The CLAHE method is applied and calculates the pixel values that exist in each RGB layer. In the field of graphic design images that have less intensity can be improved by increasing contrast. Image contrast enhancement can be done by the CLAHE method.Keywords: Maps Imagery, Contrast, CLAHE
Dinda Nabila Batubara, Agus Perdana Windarto
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), Volume 3; https://doi.org/10.30865/komik.v3i1.1664

Abstract:
The purpose of the study is to provide recommendations for the satisfaction of visitors to the animal park using the C4.5 datamining classification data laminating technique. Data sources were obtained from interviews with the management of the Pematangsiantar City Animal Park and the giving of questionnaires to random visitors as many as 150 people. Attributes used as parameters for assessing visitor satisfaction include: Ease of access to locations (C1), Infrastructure Facilities (C2), Parking lots (C3), Security (C4), Service Officers (C5) and Cleanliness (C6). The results of processing the C4.5 method using the help of RapidMiner software are the attributes of infrastructure (C2) and service officers (C5) being the attributes that most influence the level of satisfaction of visitors to the park. And the performance data shown on the suitability of the C4.5 method with the satisfaction of visitors to the animal park is 95%Keywords: Datamining, Classification, C4.5 Method, Visitors, Satisfaction, Animal Park
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), Volume 3; https://doi.org/10.30865/komik.v3i1.1696

Abstract:
This study aims at what factors influence the value of Student GPA in StikomTunas Bangsa Pematangsiantar. Data used is obtained by giving questionnaires to students of STIKOM Tunas Bangsa Pematangsiantar. With alternatives used, namely curriculim, intelligence, absenteeism, and value. While the criteria used are the names of respondents who answer a question. The method used in this study is Electre II. From the results of the ELECTRE II calculation, the third alternative A3 is obtained as the first rank, A2 as the second rank, A4 as the third rank, and A1 as the last alternative. It is hoped that this research can be used by the education as teaching material for the students' academic success and progress.Keywords: Students, GPA, Decision Support System, ELECTRE II
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), Volume 3; https://doi.org/10.30865/komik.v3i1.1599

Abstract:
The authenticity of a digital file is something that must be able to be guaranteed its existence, considering that there are so many devices that can be used to carry out manipulation of the digital file. One of the digital files discussed in this study is an audio file with MP3 file extension. Please note that MP3 audio files are now very easy to obtain, even very easy to manipulate and insert objects in, so we need a safety technique to maintain the authenticity of the audio file. Overcoming the problem that has been explained in the previous paragraph, the appropriate security technique used is the hash cryptographic technique, by applying the CRC 32 algorithm. The application of CRC 32 aims to generate hash codes from MP3 audio files that can be used as key codes for authentication (key authenticity) of MP3 audio files. The results of this study are a representation of the technical explanation of the application of the CRC 32 algorithm in generating MP3 audio file hash codes, which the CRC 32 algorithm is applied to applications that have been designed and built using the help of MATLAB software version 6.1.Keywords: File Authenticity, Audio File, CRC 32, MATLAB 6.1
, Suhada Suhada, Dedi Suhendro
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), Volume 3; https://doi.org/10.30865/komik.v3i1.1609

Abstract:
The main occupations in 15 years and above are on average not suitable for their age, which is done by adults but is done by people 15 years and older. Therefore, I do grouping data on population 15 years and above so that we know what their main jobs are. Here I use data mining with the K-Medoids method to classify the population of 15 years according to the main occupation, this research was conducted in Indonesia. The K-Medoids method is a method of collecting data with the classic clustering partitioning technique that groups datasets from n objects into K groups known a priori. A useful tool for determining k is a silhouette. It is stronger to be agreed upon and bigger than K-Means because it must add to the difference in the difference in the square of the euclidean distance. Attractions that can be determined as cluster objects are average differences for all objects in the cluster are minimal. That is the easiest point in the cluster. K-Medoids uses objects in a collection of objects to represent a cluster. The object chosen to represent a cluster is called medoid. Clusters are built by calculating the proximity they have between a medoid and non-medoid objects.Keywords: Data mining, K-Medoid, Main Job Fields 15 years and above
Back to Top Top