cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota medan,
Sumatera utara
INDONESIA
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA
ISSN : -     EISSN : 25986341     DOI : 10.30829/algoritma
Core Subject : Science,
Arjuna Subject : -
Articles 161 Documents
MENENTUKAN TINGKAT KEMACETAN LALULINTAS DENGAN METODE ANALYTICAL HIERARCHY PROCESS (AHP) Yusuf Ramadhan Nasution
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 1, No 01 (2017): November 2017
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (376.196 KB) | DOI: 10.30829/algoritma.v1i01.1308

Abstract

Traffic density in the city of Medan, especially in the District of Medan City, has caused serious problems in various fields such as impaired travel comfort, travel boredom, travel fatigue, waste of time and material. With some of these problems, a decision support system is needed that can help reduce traffic congestion. In the decision-making process involving many criteria and many alternatives, the Analytical Hierarchy Process (AHP) method is often used as a problem-solving method. Decision-making is done by giving the value of perception as weighted by a decision maker or expert. The results of this study is the establishment of a decision support system to determine the level of traffic congestion in Medan City Sub-district by using AHP so as to provide an information for the users of the road to reduce the congestion level in the future. Keywords: Congestion, traffic, District of Medan City, Decision support system, AHP.
ALGORITMA MODEL PENENTUAN LOKASI FASILITAS TUNGGAL DENGAN PROGRAM DINAMIK Firmansyah Firmansyah; Rima Aprilia
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 2, No 1 (2018): April 2018
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (385.687 KB) | DOI: 10.30829/algoritma.v2i1.1613

Abstract

Facility plays an important role of the real world, the facility is no longer a secondary requirement but becomes a primary need. Provision of facilities from any company requires a competitive location, so that the facilities provided can be useful for others. Dynamic Programming was once used to determine the best opening schedule of Subset as an "optimal" location and relocation strategy for planning. So in this research done determination of location of facility and its relocation with dynamic programming so hopefully can use optimal budget with optimal time.Keywords: Facility Location, Dynamic Programming
DRILL AND PRACTICE MODEL DALAM PEMBUATAN MEDIA PEMBELAJARAN INTERAKTIF PEMBENTUKAN OBJEK PRIMITIF SEDERHANA DUA DIMENSI Edi Ismanto; Eka Pandu Cynthia
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 1, No 01 (2017): November 2017
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (854.959 KB) | DOI: 10.30829/algoritma.v1i01.1304

Abstract

One way to improve the professionalism of teachers is to create a simple interactive learning medium that provides widespread success in a lesson and for its implementation. Computer Graphics is one of the science of the process to produce or create an image based on the description of the object and the background contained in the image using the computer, started from a two-dimensional object that later developed into a three-dimensional object. The simplest primitive object is a two-dimensional object formed from object-forming algorithms in computer graphics. The process and the length of the algorithm is often felt quite difficult for students understanding in the computer lecturing process of this graph, because it is aimed at making a computer graphics learning media with the topic of the formation of two-dimensional object using computer-based learning model drill and practice. This model is chosen because it has advantages: interactive in the presentation of the material, can provide direct feedback, data storage, patience and motivation to learn. Lectora is an e-learning based media development tool, also commonly known as software (authoring tool) software that enables the incorporation of text, image, sound and video elements into an interactive learning multimedia. Lectora software will help the making of interactive learning media in this research, so that with this media, students are expected to more quickly and easily understand the computer lectures graphs especially for material formation of two-dimensional objects.Keywords: Lectora Inspire, Computer Graphics, Learning Media, Two Dimensional Objects.
MODIFIKASI ALGORITMA PLAYFAIR CIPHER DENGAN PENGURUTAN ARRAY PADA MATRIKS Mhd. Zulfansyuri Siambaton; Abdullah Muhazir
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 2, No 1 (2018): April 2018
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (233.601 KB) | DOI: 10.30829/algoritma.v2i1.1618

Abstract

Playfair Cipher method is one of cryptography method that has long been known and still used until now. But the cryptanalysts are trying to solve the method so it is necessary to modify the Playfair Cipher in order to increase the ability of the security provided. By changing the size of the matrix to 6x6 by adding characters from 0 to 9 and sorting by array into insertion into the matrix, it is expected to be stronger than the standard playfair.
RANCANG BANGUN APLIKASI PENGAMAN ISI FILE DOKUMEN DENGAN ALGORITMA RSA Rakhmat Kurniawan
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 1, No 01 (2017): November 2017
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (489.398 KB) | DOI: 10.30829/algoritma.v1i01.1309

Abstract

Document security is one of the most important things in the exchange of data, especially the exchange of data in the virtual world in which there are many threats when the process is done. Data security, especially for text documents for an organization that assumes that the document is confidential (private and confidential). One aspect of security in a text document is its authenticity, form and contents must be in accordance with the intended by the author. Until now the cryptographic system is one solution to ensure the security of a data that is by encode the contents or content file the document becomes difficult content not even understood through the process of encryption and to recover the original information is done, the decryption process is accompanied by using the key correct. One of the most popular methods in cryptography is RSA, which to this day is very difficult to solve and will take a very long time. This method uses 2 (two) keys, namely public key and private key. Where the key length can be determined and adjusted to the desired level of security.Keywords: data security, RSA, cryptography
ANALISA SISTEM PENDUKUNG KEPUTUSAN MENGGUNAKAN METODE TOPSIS UNTUK SISTEM PENERIMAAN PEGAWAI PADA SMA AL WASHLIYAH TANJUNG MORAWA Sriani Sriani; Raissa Amanda Putri
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 2, No 1 (2018): April 2018
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (305.596 KB) | DOI: 10.30829/algoritma.v2i1.1614

Abstract

Decision support system is a system that is able to solve problems efesian, effectively, which aims to help make decisions by choosing a variety of alternative decisions. With the software implemented hiring decision support system by using TOPSIS method to facilitate decision-making in SMA Al Washliyah Tanjung Morawa. The program used role in this system is Microsoft Visual Studio 2008 by using a MySQL database as the tools used for the testing process. The results of this program show that the progress of science and technology, each job can be more efficiently and effectively. The program is expected to provide a solution or settlement of the existing problems, thus adding to the treasury of the new science. Keywords:Decision support system, TOPSIS
DETEKSI TINGKAT KEMIRIPAN DATA SISWA PESERTA UJIAN BERBASIS KOMPUTER PADA BIMBINGAN BELAJAR EXPERT DENGAN MENGGUNAKAN METODE LEVENSHTEIN DISTANCE Guntur Syahputra; Jijon Raphita Sagala
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 1, No 01 (2017): November 2017
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (911.648 KB) | DOI: 10.30829/algoritma.v1i01.1305

Abstract

In the world of education evaluation is mandatory to measure the level of success educational process. Computer-based Test often make students fail because of incorrect filling of biodata. This research to measure the level of similarity student identity so small mistake made by participants can be tolerated by the computer when filling of biodata and ultimately can reduce the failure rate of computer-based Test participants. This research is very important considering the change of Study methods this time to using of technology. By using approach of Levenshtein Distance method can detect the resemblance of biodata of exam participants so that when seen there is similarity it can improve the writing of wrong data. By implementing this method into the problem correction application according to the needs of the system in Bimbel Expert.Keywords : Levenstain Distance, Similarity Of Data, Examination.
EVALUASI MODEL DATA WAREHOUSE UNTUK MENDUKUNG MANAJEMEN PENDIDIKAN DENGAN TAM Raissa Amanda Putri; Sriani Sriani
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 2, No 1 (2018): April 2018
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (371.125 KB) | DOI: 10.30829/algoritma.v2i1.1619

Abstract

User acceptance is important in the software development process. The purpose of this paper is to evaluate a data warehouse model that can display all useful information that can support education management. The design results of this model will be evaluated using the Technology Acceptance Model (TAM) which describes the acceptance of information technology with certain dimensions that may affect the acceptance or not of information technology by the user. Methods of data collection using questionnaires distribution techniques, interviews and observation. The result of this research is evaluation of data warehouse model to support education management.Keywords: Model Evaluation, Data Warehouse, Education Management, Technology Acceptance Model
ANALISIS PERBANDINGAN PEMAMPATAN DATA TEKS DENGAN MENGGUNAKAN METODE HUFFMAN DAN HALF – BYTE Supiyandi Supiyandi; Okta Frida
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 2, No 1 (2018): April 2018
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (560.434 KB) | DOI: 10.30829/algoritma.v2i1.1610

Abstract

Generally the use of conventional methods in data compression can not overcome the performance of data manipulation in saving memory usage and speed in data communications. Using a new manipulation method that applies the Huffman compression algorithm and the Half-Byte alphabet can compress data from the user interface before it is stored in the repository, so performance in manipulating the data will be better. With the new method applied to an application software using programming language. Which of the two types of algorithms has a larger ratio (ratio) as a benchmark in the performance of data manipulation. With good performance, it will be able to save the use of memory space on the repository and fast in transmitting data in communicate between the user interface with the repository in the data manipulation.
Perancangan Sistem Restorasi Citra Dengan Metode Image Inpainting Abdul Halim Hasugian; Ilka Zufria
ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 2, No 2 (2018): November 2018
Publisher : UIN Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (677.008 KB) | DOI: 10.30829/algoritma.v2i2.3151

Abstract

Image Inpainting method is a technique of modifying images without being detected. The purpose of thisapplication is starting from the restoration of damaged paintings and photography to removing or replacingcertain objects. Image inpainting is one method of image restoration for confronting images that are slightlydamaged such as scratched or streaked where filling the area will be restored based on information around thearea so that the restoration is carried out completely in that area. Image restoration is often used in improvingimage quality where in this image restoration focuses on repairing damaged images, either during thedigitization process or due to intentional or accidental processes.Keywords: Image Restoration, Inpainting Method, design

Page 2 of 17 | Total Record : 161