KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer)
Jurnal KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) adalah wadah publikasi bagi peneliti dalam bidang kecerdasan buatan, kriptografi, pengolahan citra, data mining, system pendukung keputusan, mobile computing, system operasi, multimedia, system pakar, GIS, jaringan computer.
Articles
111 Documents
Search results for
, issue
"Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis"
:
111 Documents
clear
PENERAPAN ALGORITMA EVEN-RODEH PADA APLIKASI KOMPRESI FILE GAMBAR
Pramadi, Agus Adi;
Nasution, Surya Darma;
Purba, Bister
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v3i1.1570
Some image files are very large in size. So it requires a large memory storage capacity too, this is certainly a lot of costs that must be spent on the storage media. With the existence of a very large image file size in the process of sending image data files can fail because the storage media exceeds the maximum limit. The above problems can be overcome by performing the process of compressing large image files into small sizes or can reduce the bit size contained in each image file thereby saving storage containers and simplifying the process of transferring image files to other storage media. The solution to this problem is how the image file can be compressed in order to speed up the transfer and storage of image files. Image file compression aims to reduce or reduce the size of the file but does not eliminate the information data in it. With the compression technique, the data was initially large so that the size of the data can be reduced so as to save storage allocation space. In this study using the Even-Rodeh Code algorithm, using the method results in very good compression in tramisi data and transfer of image file allocation easier and faster.Keywords: Image File Compression, Event Rode Code Algorithm
ANALISA METODE SHA384 UNTUK MENDETEKSI ORISINALITAS CITRA DIGITAL
Simanullang, Putri M;
Sinurat, Sinar;
Saputra, Imam
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v3i1.1588
Cryptography is used to maintain the security of content or information that is personal from anyone except those who have the authority or secret key to open the information that has been encoded. Along with the development of technology and computers now, the increase in computer crime has also increased, especially in image manipulation. Many methods are used and carried out by people to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is authentic or fake like a diploma.In this study, the authors used the SHA-384 method to detect the originality of digital images, using this method an image that is still doubtful of its authenticity can be found out that the image is authentic or fake.Keywords: Originality, Citra, SHA-384
FUZZY LOGIC METODE TSUKAMOTO UNTUK PREDIKSI PRODUKSI CPO DENGAN PERMINTAAN BERSIFAT STOKASTIK PADA PT. TOR GANDA
Naibaho, Frainskoy Rio
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v3i1.1607
The best decision is the main goal in a problem. Decisions in the determination of stock Crude Palm Oil (CPO) the Palm Oil Mill  is very important because it is directly in contact with the company's survival. Uncertain demand becomes a major problem in the sales of CPO, and so we need a system that can answer this question. Fuzzy logic is used in matters relating to the forecast with a high degree of accuracy. Fuzzy logic mapped the problem by first changing into linguistic mathematical conditions. Role created can answer many problems, including the problem of prediction. Fuzzy logic system consists of a subset of fuzzy and fuzzy rules. Fuzzy subsets represent different subsets of input and output variables. Fuzzy rules associated with input variables to the output variable via the subsets. Given the fuzzy rules which can be formed very flexible, then the fuzzy system can compute problems quickly and efficiently.Keywords: Fuzzy Logic, Tsukamoto, stochastic, inventories, CPO
ANALISIS PERBANDINGAN KINERJA ALGORITMA FIXED LENGTH BINARY ENCODING DAN ALGORITMA ELIAS GAMMA CODE DALAM KOMPRESI FILE TEKS
Pratiwi, Dian;
Zebua, Taronisokhi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v3i1.1623
Now days, there are many algorithms developed for data compression, but there is no one that is good for compressing various types of files because of different characteristics or file structures. This research explained the result of two compression algorithms in order to know the performance comparison between the Fixed Length Binary Encoding (FLBE) algorithm and the elias gamma code algorithm in compressing text files, especially in format rtf. The parameters being compared are the ratio of compression, compression ratio, redundancy and time. Based on the test results show that the fixed length binary encoding algorithm is better than the elias gamma code algorithm where the average ratio of compression results of fixed length binary encoding algorithm is 1.66 bits while the elias gamma code is 1.62 bits. The average compression ratio of fixed length binary encoding algorithm is 60.9% while Elias Gamma Code is 62.20%. The average value of the redundancy of the fixed length binary encoding algorithm is 39.1% while the gamma code elias is 37.79%. The average time compression value of the fixed length binary encoding algorithm is 16 ms while the elias gamma code is 21 ms.Keywords: comparison, compression, FLBE algorithm, Elias Gamma Code Algorithm, text, rtf
PENERAPAN KLASIFIKASI C4.5 DALAM MENINGKATKAN SISTEM PEMBELAJARAN MAHASISWA
P, Dini Rizky Sitorus;
Windarto, Agus Perdana;
Hartama, Dedy;
Damanik, Irfan Sudahri
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v3i1.1665
The purpose of this research is to classify the improvement of student learning systems using the C4.5 datamining method. The source of the research data was obtained from the education section of STKOM Tunas Bangsa through interviews and questionnaires to semester 5 students (160 students) in the 2019-2020 academic year study program. The attributes used in the classification of student learning systems include: Teaching System (C1), Teaching Aids (C2), Environment (C3), Infrastructure Facilities (C4) and Assignment (C5). The calculation results mention the attribute Assignment (C5) is the attribute that most influences the improvement of student learning systems. The test was also carried out using the help of Rapidminer software and obtained an accuracy of 95%.Keywords: Datamining, Classification, C4.5, Student Learning, STIKOM Tunas Bangsa
MENDETEKSI ORISINALITAS FILE VIDEO MENERAPKAN METODE MD5
Nasution, Ermi Suryani
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v3i1.1583
Video is one of the multimedia content. In the video the video is stored in a file that can be changed intentionally or unintentionally. To ensure video content does not change, a mechanism is needed to detect the integrity of the video content both from the video quality and the size of the video file. In this research, video manipulation with change in duration, addition of frame and change in video file extension aims to compare the original video recording and manipulation video recording. Based on Hasher Pro testing results show that the system is running well, successfully detecting changes that occur in video files scanning video files with a percentage of 100%, all changes can be detected by the Message Digest (MD5) algorithm on the hash value.Keywords: Video, Metode Massage Digest 5 (MD5), Hasher Pro.
IMPLEMENTASI ALGORITMA REGRESI LINEAR SEDERHANA DALAM MEMPREDIKSI BESARAN PENDAPATAN DAERAH (STUDI KASUS: DINAS PENDAPATAN KAB. DELI SERDANG)
Ginting, Fransiskus;
Buulolo, Efori;
Siagian, Edward Robinson
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v3i1.1602
Data Mining is an information discovery by extracting information patterns that contain trend searches in a very large amount of data and assist the process of storing data in making a decision in the future. In determining the pattern classification techniques do to collect records (Training set). Regional income is generally derived from local taxes and levies, local taxes are one source of funding for the region on the national average has not been able to make a large contribution to the formation of local revenue. By utilizing Regional Revenue data, it can produce forecasting and predictions of Regional Revenue income in the future to match the reality / reality so that the planned RAPBD can run smoothly. Simple Linear Regression or often abbreviated as SLR (Simple Linear Regression) is one of the statistical methods used in production to make predictions or predictions about the characteristics of quality and quantity to describe the processes associated with data processing for the acquisition of regional income. So that in the testing phase with visual basic net can help in processing valid Regional Revenue Amount data. Keywords: Data Mining, Local Revenue, Simple Linear Regression Algorithm, Visual Basic net 2008
PERANCANGAN APLIKASI KOMPRESI FILE VIDEO MENGGUNAKAN ALGORITMA INTERPOLATIVE CODING
Riyansyah, Desvika
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v3i1.1618
The size of the video files is relatively large, long duration and has a good top kulithen it requires a large storage space. With a very large video file size, at the time of the move process could be the process of moving failed because the media storage space exceeds the limit and consume very much quota at the time of transfer. The solution to this problem is how the video file can be compressed to accelerate the process of transferring and saving the video files and saving the quota. In this research, the algorithm used is Interpolative Coding, using the different compression methods-the difference of each value, and the compression results will be profitable, because the delivery will be easier and saves your quota and saves storage space.Keywords: Video File compression, Interpolative Coding algorithm
TEKNIK DATA MINING DALAM PENILAIAN PENGAJARAN GURU BERDASARKAN INDEKS KEPUASAN SISWA
Gerardo, Bob Gary;
Saifullah, Saifullah;
Irawan, Eka
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v3i1.1634
Teacher performance evaluation is a process of analysis in order to produce good teaching. The process of evaluating the performance of teachers in Kartika Pematangsiantar Middle School has not been so detailed (detailed). With such detailed assessment, it is feared that there will be subjective judgments (based on personal interests), which can lead to social jealousy for teachers who do not receive achievements. In the assessment of teacher teaching students need data on teacher satisfaction. In collecting data using questionnaires and variables used in this study there were 4 namely discipline, quality of teaching, behavior, and social relations. This study aims to assist the School in improving teacher performance, especially in the way of teaching teachers based on student satisfaction using C4.5 Method.Keywords: Data Mining, Method C4.5, Kartika Middle School, Teacher Teaching Evaluation Based on Student Satisfaction Index
PENERAPAN METODE MODULUS FUNCTION (MF) UNTUK PENYISIPAN PESAN PADA CITRA DIGITAL
Raimah Handayani Harahap;
Nelly Astuti Hasibuan;
Imam Saputra
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v3i1.1695
Steganography is the science and art of hiding (embedded) information by inserting secret messages in other messages. Steganography in the field of information technology is highly developed, namely for digital devices. Information or messages that can be hidden varies, as can messages that are embedded objects. Variations of messages that are normally subject to insertion objects are text messages, picture messages, audio messages, and video messages. The steganography method used is the Modulus Function (MF) method. This method can insert more messages into pixels that have high contrast values. The research conducted is applying the Modulus Function (MF) method for inserting messages into image files. Based on the test results, it can be concluded that by using the Modulus Function (MF) method, the capacity of the image to insert a message is smaller than the image size, the processing time in this method is quite fast, the image quality after inserting a message has good quality, but this method is also still good. has disadvantages, because it is not resistant to manipulation and in some images are still detected by the matlab application.Keywords: Steganography, Implementation, Modulus Function (MF), Image file.