cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota medan,
Sumatera utara
INDONESIA
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA
ISSN : -     EISSN : 25986341     DOI : 10.30829/algoritma
Core Subject : Science,
Arjuna Subject : -
Articles 8 Documents
Search results for , issue "Vol 1, No 01 (2017): November 2017" : 8 Documents clear
PENENTUAN TEMPAT MENGINAP DENGAN MENGGUNAKAN FUZZY MULTIPLE ATTRIBUTE DECISION MAKING Rima Aprilia; Triase Triase; Sriani Sriani
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 1, No 01 (2017): November 2017
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (340.177 KB) | DOI: 10.30829/algoritma.v1i01.1306

Abstract

AbstractThe problem of determining where to eat every seminar activities outside the city becomes a problem experienced by the participants of the seminar. In determining where to stay, decision support system using fuzzy multiple attribute is expected to provide the best solution in this case. The type of research is literature study by looking for reference theory relefan with cases or problems found. References that include general decision making, problem formulation, decision making of some fuzzy attributes, and generating a decision matrix that is expected to provide the best solution of the problem. These references can be searched from books, journals, research report articles, and websites on the internet. The output of this literature study collects reference that relefan with the formulation of the problem. The goal is to strengthen the process and also become the basis for designing decision support systemsKeywords: Dual Attribute Decision Making, TOPSIS, Weighted Product
Perancangan Perangkat Lunak Pengenkripsian Citra BMP,GIF dan JPG dengan Menggunakan Metode HILL Abdul Halim Hasugian, M.Kom
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 1, No 01 (2017): November 2017
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (421.025 KB) | DOI: 10.30829/algoritma.v1i01.1302

Abstract

Digital image can be defined as a function of two variables, f (x, y), where x and y are spatial coordinates and the value of f (x, y) is the image intensity at the coordinates. Digital images represent image data in numbers representing the level of gray (color black and white) or color coordinates (color image). The problem in this system is how to implement digital image cryptography using Hill Chiper method so as to ensure the security of the digital image from the parties which is not entitled to know it or make changes in the digital image. This digital image cryptography is designed using Hill Chiper method implemented with Visual Basic 6.0 programming language. Hill Chip method is a Hill Cipher method is one of the symmetric key cryptography algorithms. Hill Cipher algorithm uses an m x m matrix as the key for encryption and decryption. The basic matrix theory used in Hill Cipher is inter-matrix multiplication and inverse in matrix. This digital image cryptography produces an obscure and invisible digital image without the help of the software that the author designs, and changes the size of the digital image file by mapping the RGB value of each pixel of the digital image into a geometry . However, this system can only encrypt digital imagery with JPG, BMP, and GIF formats so it still needs further development. Keywords: Cryptography, Digital Imagery and Hill Chiper Method 
PENDEKOMPOSISIAN CITRA DIGITAL DENGAN ALGORITMA DWT Sriani Sriani; Triase Triase; Khairuna Khairuna
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 1, No 01 (2017): November 2017
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (584.772 KB) | DOI: 10.30829/algoritma.v1i01.1307

Abstract

The current large image storage capacity is increasingly important. This need, caused by the image to be stored more and more. Digital image processing in the field of image decomposition can be a solution to minimize memory needs in representing digital images. In this case the ratio in the decomposition process becomes the reference comparison between the decomposed image with the original image. In this research decomposition process using DWT algorithm. The image decomposition based discrete wavelet transform using the calculation system with the decomposition with the direction of the row and decomposition with the direction of the column. The decomposition process uses a leveling and subtraction formula by calculating the average value of two pairs of data. The results of this study indicate that the decomposition of digital images based on discrete wavelet transform is expected to be one useful algorithm in imaging technology for digital image decomposition. Keywords: digital image, decomposition, discrete wavelet transform
IMPLEMENTASI APRIORI PADA DATA KECELAKAAN LALU LINTAS DALAM PENCARIAN RELASI ANTAR VARIABEL PELAKU Rusmin Saragih
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 1, No 01 (2017): November 2017
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1022.455 KB) | DOI: 10.30829/algoritma.v1i01.1303

Abstract

Handling traffic accidents can be done by taking steps such as the approach of socialization and supervision of road signs and traffic. To be able to find the appropriate solutions to the prevention of information required traffic accidents that occur. By observing the relevant variables of traffic accident perpetrators, it can be obtained the criteria from the traffic accident perpetrators that are dominant from the relations of LAKA actors such as education, age and other variables. Apriori applied to data of LAKA actors from recent years to be able to obtain information relation between variator of LAKA actor so that can become reference to prevention and prevention of traffic accident. The a priori output of the laka perpetrator data provides the pattern relation information of the LAKA actor’s variable. Keywords: Data Mining, Apriori, Traffic Accident
MENENTUKAN TINGKAT KEMACETAN LALULINTAS DENGAN METODE ANALYTICAL HIERARCHY PROCESS (AHP) Yusuf Ramadhan Nasution
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 1, No 01 (2017): November 2017
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (376.196 KB) | DOI: 10.30829/algoritma.v1i01.1308

Abstract

Traffic density in the city of Medan, especially in the District of Medan City, has caused serious problems in various fields such as impaired travel comfort, travel boredom, travel fatigue, waste of time and material. With some of these problems, a decision support system is needed that can help reduce traffic congestion. In the decision-making process involving many criteria and many alternatives, the Analytical Hierarchy Process (AHP) method is often used as a problem-solving method. Decision-making is done by giving the value of perception as weighted by a decision maker or expert. The results of this study is the establishment of a decision support system to determine the level of traffic congestion in Medan City Sub-district by using AHP so as to provide an information for the users of the road to reduce the congestion level in the future. Keywords: Congestion, traffic, District of Medan City, Decision support system, AHP.
DRILL AND PRACTICE MODEL DALAM PEMBUATAN MEDIA PEMBELAJARAN INTERAKTIF PEMBENTUKAN OBJEK PRIMITIF SEDERHANA DUA DIMENSI Edi Ismanto; Eka Pandu Cynthia
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 1, No 01 (2017): November 2017
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (854.959 KB) | DOI: 10.30829/algoritma.v1i01.1304

Abstract

One way to improve the professionalism of teachers is to create a simple interactive learning medium that provides widespread success in a lesson and for its implementation. Computer Graphics is one of the science of the process to produce or create an image based on the description of the object and the background contained in the image using the computer, started from a two-dimensional object that later developed into a three-dimensional object. The simplest primitive object is a two-dimensional object formed from object-forming algorithms in computer graphics. The process and the length of the algorithm is often felt quite difficult for students understanding in the computer lecturing process of this graph, because it is aimed at making a computer graphics learning media with the topic of the formation of two-dimensional object using computer-based learning model drill and practice. This model is chosen because it has advantages: interactive in the presentation of the material, can provide direct feedback, data storage, patience and motivation to learn. Lectora is an e-learning based media development tool, also commonly known as software (authoring tool) software that enables the incorporation of text, image, sound and video elements into an interactive learning multimedia. Lectora software will help the making of interactive learning media in this research, so that with this media, students are expected to more quickly and easily understand the computer lectures graphs especially for material formation of two-dimensional objects.Keywords: Lectora Inspire, Computer Graphics, Learning Media, Two Dimensional Objects.
RANCANG BANGUN APLIKASI PENGAMAN ISI FILE DOKUMEN DENGAN ALGORITMA RSA Rakhmat Kurniawan
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 1, No 01 (2017): November 2017
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (489.398 KB) | DOI: 10.30829/algoritma.v1i01.1309

Abstract

Document security is one of the most important things in the exchange of data, especially the exchange of data in the virtual world in which there are many threats when the process is done. Data security, especially for text documents for an organization that assumes that the document is confidential (private and confidential). One aspect of security in a text document is its authenticity, form and contents must be in accordance with the intended by the author. Until now the cryptographic system is one solution to ensure the security of a data that is by encode the contents or content file the document becomes difficult content not even understood through the process of encryption and to recover the original information is done, the decryption process is accompanied by using the key correct. One of the most popular methods in cryptography is RSA, which to this day is very difficult to solve and will take a very long time. This method uses 2 (two) keys, namely public key and private key. Where the key length can be determined and adjusted to the desired level of security.Keywords: data security, RSA, cryptography
DETEKSI TINGKAT KEMIRIPAN DATA SISWA PESERTA UJIAN BERBASIS KOMPUTER PADA BIMBINGAN BELAJAR EXPERT DENGAN MENGGUNAKAN METODE LEVENSHTEIN DISTANCE Guntur Syahputra; Jijon Raphita Sagala
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 1, No 01 (2017): November 2017
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (911.648 KB) | DOI: 10.30829/algoritma.v1i01.1305

Abstract

In the world of education evaluation is mandatory to measure the level of success educational process. Computer-based Test often make students fail because of incorrect filling of biodata. This research to measure the level of similarity student identity so small mistake made by participants can be tolerated by the computer when filling of biodata and ultimately can reduce the failure rate of computer-based Test participants. This research is very important considering the change of Study methods this time to using of technology. By using approach of Levenshtein Distance method can detect the resemblance of biodata of exam participants so that when seen there is similarity it can improve the writing of wrong data. By implementing this method into the problem correction application according to the needs of the system in Bimbel Expert.Keywords : Levenstain Distance, Similarity Of Data, Examination.

Page 1 of 1 | Total Record : 8