Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : JURIKOM (Jurnal Riset Komputer)

Penerapan Metode Dempster Shafer Dalam Mendeteksi Kerusakan Mesin Air Berbasis Android Afrilia, Yolanda; Sembiring, Abdul Sani; Hutabarat, Hukendik
JURIKOM (Jurnal Riset Komputer) Vol 5, No 2 (2018): April 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (400.294 KB) | DOI: 10.30865/jurikom.v5i2.666

Abstract

Many people do not understand the water damage, so tend to use the technician regardless of the damage. What's more to the present day many people do things quickly and accurately? Treatments that would be done alone without having to come to the service is very helpful at all for everyday life. The expert system is one of the artificial intelligence systems that contain the knowledge and experience that one expert puts into one particular area each person can use to solve a specific problem. In this case, water span range occurs in daily life. In this thesis will be discussed on how to find damage to the water machine by applying the Dempster-Shafer method. This method is used to search for evidence based on belief functions and plausible reasoning used by combining separate information (evidence) pottery to calculate the possibility of a malfunction.
Perancangan Aplikasi Keamanan Data Dengan Kombinasi Algoritma Kriptografi RC4 Dan One Time Pad Anas, Irfan; Ginting, Guidio Leonarde; Ndruru, Eferoni; Sembiring, Abdul Sani; Zebua, Taronisokhi
JURIKOM (Jurnal Riset Komputer) Vol 8, No 1 (2021): Februari 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v7i5.2541

Abstract

Data is an important aspect that has important information in it, which includes numbers, characters, symbols, pictures, sounds, or other signs that can be used as information. Data are certain facts, thus producing information. Cryptography is often used to secure and encode text data, messages, or other information, so using cryptographic algorithms on text data is able to secure data that is very important to everyone. So the expected results from the RC4 Cryptography algorithm and One Time Pad, which are used in text data can help in securing or encoding very important text data, so that the text is not easy to read or know the original message.
Implementasi Algoritma Adaptive Arithmetic Coding Pada Aplikasi Juz’ Amma Berbasis Android Ari Maulana Asri; Abdul Sani Sembiring
JURIKOM (Jurnal Riset Komputer) Vol 8, No 2 (2021): April 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v8i2.2828

Abstract

The size of the text file is relatively large, where the more information contained in the file, the larger the size of the text file needed to store the information, so that it has an impact on the file size that must be stored on the storage media. The memory size required to store a file is directly proportional to the size of the text file. The problem that occurs is the limited storage space available, especially for Android applications. If the text file size is larger than the storage space or the maximum size limit for a file, sending the text file will fail or the information contained in the text file will not be conveyed properly. This research studies text file compression techniques using arithmetic coding, and implements it for compression and decompression cases. Things to be studied include: looking at the effect of character variations in a text on the compression ratio, the resulting compression time and the decompression time. The experimental results show that the highest compression ratio is obtained when a text has only one type of character. The effect of character variations on the compression ratio is that the more character variations a text has, the lower the compression ratio.
PERANCANGAN APLIKASI PEMBELAJARAN TEKNOLOGI INFORMASI DAN KOMUNIKASI (TIK) DENGAN MENGGUNAKAN METODE COMPUTER BASED INSTRUCTION Oaber Situmorang; Abdul Sani Sembiring
JURIKOM (Jurnal Riset Komputer) Vol 3, No 1 (2016): Februari 2016
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (457.387 KB) | DOI: 10.30865/jurikom.v3i1.49

Abstract

Hardware Komputer (Perangkat Keras) merupakan komputer yang terdiri atas susunan komponen- komponen elektronik berbentuk fisik (berupa benda). Jenis-jenis hardware pada Personal Computer (PC), antara lain Motherboard, hardisk, memori, dan lain-lain. Bukan hanya perangkat yang ada didalam CPU (Central Processing Unit) saja yang disebut dengan hardware, perangkat luarnya pun yang berhubungan langsung dengan komputer, dapat disebut dengan hardware. Misalanya: Monitor, Keyboard, Mouse, Printer dan lain-lain. Seperti yang kita ketahui hardware komputer terbagi atas 4 bagian yang diantaranya: Hardware Input,Hardware Process,Hardware Output, dan Hardware Storage. Keberadaan metode pembelajaran Computer Based Instruction (CBI) dapat membantu memudahkan orang yang ingin mempelajari materi-materi hardware komputer dan berlatih mengerjakan soal-soal tentang hardware komputer melalui komputer dan internet sehingga pengguna tidak perlu mengikuti pelatihan formal yang membutuhkan biaya besar serta dapat lebih mahir dengan belajar mandiri melalui program pembelajaran hardware komputer. Kata kunci: Hardware Komputer, Computer Based Instruction, Pembelajaran