Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : JURIKOM (Jurnal Riset Komputer)

Sistem Pendukung Keputusan Penentuan Surveyor Terbaik Menerapkan Algoritma Iterative Dichotomizer 3 Rikki Ramadan Saragih; Natalia Silalahi
JURIKOM (Jurnal Riset Komputer) Vol 7, No 6 (2020): Desember 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v7i6.2594

Abstract

The surveyor has the task of conducting surveys or supervising the main object of other work, while the other work is the marketing objective of the Bank. The importance of the surveyor for the company so that all transactions that will be carried out by the debtor do not experience problems or the term is bad credit. Bank Mandiri Syariah sometimes gets results that cannot guarantee the success of the payment period from prospective debtors, this is due to the possibility of disobedience of survey officers to work properly, thus of course detrimental to Bank Mandiri Syariah Medan. Bank Mandiri Syariah Medan provides a career path for survey officers to become Supervisor Surveyors. The determination of the best surveyor is carried out by processing the data according to the types of criteria used as the reference standard in Bank Mandiri Syariah Medan. The application of the Iterative Dichotomizer 3 algorithm for the process of determining the best surveyor is carried out by defining the limits of the value of the input variable.
Analisa Algoritma Noekeon Untuk Mengamankan File Video Milawati Milawati; Natalia Silalahi; Kennedi Tampubolon
JURIKOM (Jurnal Riset Komputer) Vol 8, No 3 (2021): Juni 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v8i3.2840

Abstract

Along with the times, human needs are increasing, including the need for information. Therefore, sending and storing files via electronic media requires a process that is able to guarantee the safety and integrity of the file. To ensure the safety and integrity of a file, it requires a file. The encryption process is carried out when the file is sent. This process will change the original file into a secret file that cannot be read. Meanwhile, the decryption process is carried out by the recipient of the sent file. The secret file received will be changed back to the original file. By means of this encryption, the original file will not be read by unauthorized parties, but only by the recipient who has decryption key. Currently, one of the methods used to secure files is to use a cryptographic system by encoding the contents of the information (plaintext) into incomprehensible content through an encryption process (enchiper), and to retrieve the original information, a encryption process is carried out ( dechiper). accompanied by using the correct key. However, in line with the development of encryption or cryptography, efforts to obtain this key can be done by anyone, including those who are not authorized to choose the information. Therefore, research on cryptography will always evolved to obtain ever stronger cryptographic algorithms, making attempts to illegally decode cryptography illegally become more difficult