cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
-
Journal Mail Official
ejurnal.stmikbudidarma@gmail.com
Editorial Address
-
Location
Kota medan,
Sumatera utara
INDONESIA
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer)
ISSN : 25974610     EISSN : 25974645     DOI : -
Jurnal KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) adalah wadah publikasi bagi peneliti dalam bidang kecerdasan buatan, kriptografi, pengolahan citra, data mining, system pendukung keputusan, mobile computing, system operasi, multimedia, system pakar, GIS, jaringan computer.
Arjuna Subject : -
Articles 111 Documents
Search results for , issue "Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis" : 111 Documents clear
PENERAPAN ALGORITMA MAUT (MULTY_ATTRIBUTE UTILITY THEORY) DALAM PEMILIHAN PUPUK TERBAIK PADA TANAMAN KELAPA SAWIT Annisa Khairani; Heru Satria Tambunan; M. Fauzan
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1684

Abstract

Fertilizer is an ingredient that contains one or more nutrients or nutrients for plants to support the growth and development of plants. Oil palm plantations produce large profits so that many forests and old plantations are converted into oil palm plantations. To produce the best palm oil production, it is recommended that fertilizers have the quality and quantity precisely and quickly so that the target in the development of oil palm can be achieved maximally in its growth process. Many methods can be used to solve problems in the scientific field, one of the methods SPK. Researchers used the MAUT (Multy-Attribute Utility Theory) method in solving the problem of selecting the best fertilizer on oil palm plants based on several criteria that were set. Visual Basic 2010 application is the software used in this study. It is hoped that this research can recommend the best fertilizer used on plantations to maintain the quality of oil palm plants.Keywords : SPK, MAUT, Visual Basic 2010, MADM, Microsoft Access
PENERAPAN DATAMINING DENGAN METODE KLASIFIKASI UNTUK STRATEGI PENJUALAN PRODUK DI UD.SELAMAT SELULAR Sinta Maulina Dewi; Agus Perdana Windarto; Dedy Hartama
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1669

Abstract

In the current era of globalization, developments in various fields of business are accelerating. Both in the culinary field and other fields. One of the most sought after business developments is in the field of counters or credit sales. UD.Selamat Selular was founded in 2010, which only has a small shop with no employees to date which has more than 20 employees. This business continues to develop in ever-increasing business competition. Therefore a sales strategy is needed so that it is not inferior to other trading businesses. In this research, it is necessary to test the previous data in order to find out the right sales strategy using Naïve Bayes. The data collection method was conducted by questionnaire and interview with a questionnaire of 160 respondents. From the results of this study it can be concluded that the model formed using the Naïve Bayes algorithm produces an algorithm of 0.650 so that it is classified as Excellent Classification.Keywords: Datamining, Naïve Bayes, Sales Strategy.
IMPLEMENTASI ALGORITMA C5.0 PADA KELULUSAN PESERTA UJIAN KEMAHIRAN BERBAHASA INDONESIA (UKBI) PADA BALAI BAHASA SUMATERA UTARA Mauhati Pardede; Efori Buulolo; Eferoni Ndruru
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1569

Abstract

The development of the modern era has made many people more influenced in using foreign languages in their daily lives. Almost every day, the people especially the generation in this era understand more about the use of foreign languages than the language from their own country. One of the efforts to strengthen the position of Indonesian is carried out by the Balai Balai Bahasa by developing an Indonesian language proficiency test tool called the Indonesian Language Proficiency Test (UKBI). The Indonesian Language Proficiency Test (UKBI) was assessed based on several factors of the participant's ability to listen, respond to the rules, read, write and speak. So far some of the UKBI participants at the North Sumatra Language Center have failed or failed, one of the contributing factors is that the assessment was not fulfilled. To overcome the problems above, a method is needed. The technique that can be utilized in the process of processing data is the classification with the C5.0 algorithm. C5.0 algorithm is a classification algorithm applied to decision tree techniques that are processed using information gain. In selecting attributes for object breakers in several classes, the attribute that produces the greatest information gain with the highest information gain value will be chosen as the parent of the next node.Keywords: Indonesian Language Proficiency Test, C5.0 Algorithm
PENERAPAN ALGORITMA BOYER MOORE PADA AUTOMATIC LINK PADA CONTENT WEBSITE Didik Didik; Guidio L Ginting
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1587

Abstract

Building a website requires a good plan so that the website can be used effectively and efficiently. The stages carried out in building a website are started by collecting data then studying the data, then planning is carried out which is then poured in the form of a design, then the design is developed and carried out. In building a website, it certainly has its own problems, such as interface display, data processing, performance, interaction with users, and others. To build a website that has a lot of menus, is a problem for builders, because the space to place a menu will be very limited if it is aimed at devices that have a small display such as a cellphone. The algorithm in the string matching method used in this study is the Boyer Moore algorithm, this algorithm is considered the most efficient general application algorithm, the Boyer Moore algorithm includes the most efficient string matching algorithm.Keywords: String Matching Search, Boyer Moore
PEMILIHAN KEPLING TELADAN MENERAPKAN METODE RANK ORDER CENTROID (ROC) DAN METODE ADDITIVE RATIO ASSESSMENT (ARAS) DI KECAMATAN MEDAN AREA Liza Handayani; Muhammad Syahrizal; Kennedi Tampubolon
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1638

Abstract

The head of the environment is an extension of the head of the village head in assisting or providing services to the community both in the administration of administration in the village and to other problems. It is natural for a kepling to be appreciated for their performance during their special tenure in the kecamatan field area. Previously, the selection of a dipling in a sub-district was very inefficient and seemed unfair for this exemplary selection to use a system to produce an accurate value, and no intentional element. To overcome the process of selecting an exemplary kepling that experiences these obstacles by using an application called a Decision Support System. Decision Support System (SPK) is a system that can solve a problem, and this system is also assisted with several methods, namely the Rank Order Centroid (ROC) method that can assign weight values to each of the criteria based on their priority level. And to do the ranking or determine an exemplary set using the Additive Ratio Assessment (ARAS) method, this method provides decision making that takes decisions based on ranking or the highest value.Keywords: Head of Medan Area Subdistrict, SPK, Centroid Rank Order, Additive Ratio Assessment (ARAS).
ANALISA KLASIFIKASI DATA MINING PADA TINGKAT KEPUASAN PENGUNJUNG TAMAN HEWAN PEMATANG SIANTAR DENGAN ALGORITMA Dinda Nabila Batubara; Agus Perdana Windarto
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1664

Abstract

The purpose of the study is to provide recommendations for the satisfaction of visitors to the animal park using the C4.5 datamining classification data laminating technique. Data sources were obtained from interviews with the management of the Pematangsiantar City Animal Park and the giving of questionnaires to random visitors as many as 150 people. Attributes used as parameters for assessing visitor satisfaction include: Ease of access to locations (C1), Infrastructure Facilities (C2), Parking lots (C3), Security (C4), Service Officers (C5) and Cleanliness (C6). The results of processing the C4.5 method using the help of RapidMiner software are the attributes of infrastructure (C2) and service officers (C5) being the attributes that most influence the level of satisfaction of visitors to the park. And the performance data shown on the suitability of the C4.5 method with the satisfaction of visitors to the animal park is 95%Keywords: Datamining, Classification, C4.5 Method, Visitors, Satisfaction, Animal Park
PENERAPAN METODE CLAHE UNTUK MEMPERJELAS OBJEK PANTULAN KACA PADA CITRA DIGITAL Sulharmi Irawan; Yasir Hasan; Kennedi Tampubolon
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1563

Abstract

Glass reflection image displays unclear or suboptimal visuals, such as overlapping images that blend with overlapping displays, so objects in images that have information and should be able to be processed for advanced research in the field of image processing or computer graphics do not give the impression so that research can be done. Improvement of overlapping images can be separated by displaying one of the image objects, the method that can be used is the Contras Limited Adaptive Histogram Equalization (CLAHE) method. CLAHE can improve the color and appearance of objects that are not clear on the image. Images that experience cases such as glass reflection images can be increased in contrast values to separate or accentuate one of the objects contained in the image using the Contrast Limited Adaptive Histogram Equalization (CLAHE) method.Keywords: Digital Image, Glass Reflection, Contrast, CLAHE, YIQ.
PENERAPAN METODE SEGITIGA PASCAL ALJABAR UNTUK MEMAKSIMALKAN TEKNIK PENYANDIAN ALGORITMA WORD AUTO KEY ENCRYPTION (WAKE) Kaldius Ndruru; Putri Ramadhani
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1582

Abstract

Security of data stored on computers is now an absolute requirement, because every data has a high enough value for the user, reader and owner of the data itself. To prevent misuse of the data by other parties, data security is needed. Data security is the protection of data in a system against unauthorized authorization, modification, or destruction. The science that explains the ways of securing data is known as cryptography, while the steps in cryptography are called critical algorithms. At this time, there are many cryptographic algorithms whose keys are weak especially the symmetric key algorithm because they only have one key, the key for encryption is the same as the decryption key so it needs to be modified so that the cryptanalysts are confused in accessing important data. The cryptographic method of Word Auto Key Encryption (WAKE) is one method that has been used to secure data where in this case the writer wants to maximize the encryption key and description of the WAKE algorithm that has been processed through key formation. One way is to apply the algebraic pascal triangle method to maximize the encryption key and description of the WAKE algorithm, utilizing the numbers contained in the columns and rows of the pascal triangle to make shifts on the encryption key and the description of the WAKE algorithm.Keywords: Cryptography, WAKE, pascal
IMPLEMENTASI ALGORITMA LEVENSTEIN UNTUK KOMPRESI FILE VIDEO PADA APLIKASI CHATTING BERBASIS ANDROID Dani Iqbal
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1601

Abstract

Technology is developing very rapidly along with the needs of the community in obtaining information quickly. Chat application as a communication tool that can help communicate without any time restrictions and is free from obstacles. But in communicating through chat applications can not be free or free in communicating in general. Where the chat application has a predetermined number of bits, so that in sending video on the chat application can not be at once but in several times the transmission. The solution to this problem is how the video can be compressed in order to speed up the process of sending and storing video files. compression on video files is done by reducing the size of the video by the process of reducing the bits in the video, but does not eliminate the data information in it. In this study, the algorithm used is Levenstein, using this method, the compression results from the Levenstein value have different results from each value, and the compression results will be advantageous in sending and transferring video files.Keywords: Video Compression, Levenstein Algorithm, Chatting Application
PERBANDINGAN METODE MD2 DAN MD4 UNTUK MENDETEKSI KEASLIAN CITRA DIGITAL Gokma Lumbantoruan; Hery Sunandar; Imam Saputra
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1617

Abstract

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others.The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD2 and MD4 methods to detect the originality of digital images, by using this method an image that is still doubtful of its authenticity can be found out that the image is authentic or fake. Keywords: Authenticity, Image, MD2 and MD4

Page 11 of 12 | Total Record : 111