cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
-
Journal Mail Official
ejurnal.stmikbudidarma@gmail.com
Editorial Address
-
Location
Kota medan,
Sumatera utara
INDONESIA
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer)
ISSN : 25974610     EISSN : 25974645     DOI : -
Jurnal KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) adalah wadah publikasi bagi peneliti dalam bidang kecerdasan buatan, kriptografi, pengolahan citra, data mining, system pendukung keputusan, mobile computing, system operasi, multimedia, system pakar, GIS, jaringan computer.
Arjuna Subject : -
Articles 600 Documents
Penarapan Algoritma Prefix Code Dalam Kompresi File Video Alfarizi, Muhammad; Aripin, Soeb; Zebua, Taronisokhi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 4, No 1 (2020): The Liberty of Thinking and Innovation
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v4i1.2686

Abstract

Data compression technology is the process of converting a set of data into a lower coded representation of data that is not encoded with a certain encoding. Data compression is done by encoding each character into a shorter coded message, in order to save storage space requirements and time for data transmission. Compressing is used to speed up the sending process from uncoded characters to certain encoded characters. By compressing, large data will be reduced in size so as to save storage capacity. In this study, using the Prefix Code algorithm, by using this method the compression results are very good in making data transmission and transferring video file allocations easier and faster. By doing compression, large data will be reduced in size so that it can save storage space. There are many types of methods or algorithms in video file compression, but in this algorithm the writer only wants to know the compression process using the Prefix Code algorithm using the C1 code where the author has successfully compressed a video file with the prefix code algorithm using the C1 code has the ability to compress video file 37, 5% on a video file.Keywords: Compression, Video, File, Prefix Code, Algorithm.
Modifikasi Kunci Algoritma International Data Encryption Algorithm Menggunakan Multiplicative Random Number Generator Untuk Mengamankan Citra Digital Oktavian Laksamana Suryo; Muhammad Syahrizal; Alwin Fau
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 4, No 1 (2020): The Liberty of Thinking and Innovation
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v4i1.2715

Abstract

A Digital Image may have important information in it where this confidential information should not be seen by unauthorized people. Information in a digital image can be easily remembered by others compared to information in the form of text. For this reason, images containing information must be encrypted using cryptography, but encoding the image is of course not enough to protect the information contained in it because the key may be known by outsiders.To maintain the confidentiality of information from digital images, digital images will be encoded using the IDEA algorithm, but the level of security of the algorithm should be improved. Therefore, to improve the quality of digital image security, the IDEA algorithm key is first modified using a Multiplicative Random Number Generator.Through the IDEA algorithm process which is quite complicated, coupled with the previously modified key using the Multiplicative Random Number Generator, it is hoped that it can improve the quality of the security of confidential information encoded in a digital image, so that the information contained in the digital image does not leak to it. irresponsible party.Keywords: Digital Image, Modification, Cryptography, IDEA, Multiplicative Random Number Generator.
Pengaruh Penggunaan Driver Motor DC Pada Robot Line Tracer Herdi anto
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 4, No 1 (2020): The Liberty of Thinking and Innovation
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v4i1.2572

Abstract

Robot line tracer merupakan   robot yang  bergerak  mengikuti  bentuk  lintasan  yang  dibuat  dengan  warna  lintasan  dapat  berupa warna putih  dengan samping  kiri kanan lintasan    berwarna hitam  atau  sebaliknya. Robot ini sering dijadikan perlombaan adu cepat dalam mencapai garis  finish sehingga  membutuhkan  kecepatan  dan kestabilan  pada saat bergerak di lintasan. Tetapi salah satu permasalahan pada robot line  tracer ini   sering keluar lintasan pada saat melewati lintasan  yang  berbentuk tikungan Untuk itu tujuan penelitian ini adalah mengetahui pengaruh penggunaan driver motor DC yang menggunakan IC L298  dan MOSFET  terhadap kecepatan  dan kestabilan  robot line tracer pada saat melintas pada  semua bentuk lintasan. Untuk mencapai tujuan penelitian  tersebut maka langkah – langkah  yang dilakukan yaitu mengumpulkan  data, analisis  data, desain rangkaian, pembuatan   program, implementasi  desain  rangkaian  serta pengujian implementasi  desain. Metode  yang  digunakan dalam pengontrolan  robot line  tracer  adalah PID. Dari hasil pengujian yang telah dilakukan untuk  robot line  tracer  menggunakan driver motor DC  dengan IC L298  hanya  dapat bergerak   dengan kecepatan 21 meter/menit dan pergerakan  robot pada  saat  melintasi lintasan  sudah   cukup  stabil. Sedangkan untuk   robot line  tracer  menggunakan driver motor DC  dengan MOSFET masih pada  tahap  simulasi  di proteus    belum  dilakukan implementasi  desaian rangkaian   dan uji   berjalan   di lintasan
Identifikasi Jenis Buah Berdasarkan Biji Dengan Menerapkan Menerapkan Metode Viola Jones Dessy Aina Sari; Nelly Astuti Hasibuan; Imam Saputra
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 4, No 1 (2020): The Liberty of Thinking and Innovation
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v4i1.2653

Abstract

The era of technology that is increasingly developing nowadays has an influence on knowledge, one of which is the introduction or identification. The identifier is a stage in the development of an identification system with image processing and detection. In the introduction of fruit seeds, there are some people or lay people who find it difficult to distinguish the types of fruit based on the seeds of the fruit because there are several fruits that have seeds that are almost the same shape and color, so there may be errors in determining the type of fruit. To find out the type of fruit based on the seeds, he identified the seeds. This identification is done to classify in order to know the results of these types of fruit by applying the Viola Jones method which can help in identifying because the Viola Jones method is an algorithm that can detect objects in the image. In this method there are several concepts that are combined into a method so that it can detect and detect an object of the seed made. The Viola Jones method uses the Haar feature as a descriptor, then combines Integral Image and AdaBoost to find and select values and objects and form a Cascade Classifier that will be used as a detector. This identifier is useful for the community to be able to recognize or know the type of fruit through the seeds.Keywords: Image, Contraharmonic Mean Filter, Noise Reduction.
Modifikasi Kunci Algoritma IDEA Menggunakan Random Key Midsquare Pada Citra Fuady Mahbub; Muhammad Syahrizal; Rivalri K. Hondro
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 4, No 1 (2020): The Liberty of Thinking and Innovation
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v4i1.2681

Abstract

A Digital Image may have important information in it where this confidential information should not be seen by unauthorized people. Information in a digital image can be easily remembered by others compared to information in the form of text. For this reason, an image containing information must be encrypted using cryptography, but encoding the image is of course not enough to protect the information contained in it because of the key that may be known by outsiders. To maintain the confidentiality of the information from the image, previously the image will be encoded using the IDEA algorithm, however, the security level of the algorithm should be further improved. Therefore, to improve the quality of digital image security, the IDEA algorithm key is first modified using a Midsquare random number generator. Through the process of the IDEA algorithm which is quite complicated, coupled with the previously modified keys using the Random Key Midsquare random number generator, it is expected to be able to improve the security quality of confidential information encoded in a digital image, so that the information contained in the digital image does not leak to parties. who are not responsible.Keywords: Image, Cryptography, IDEA, Random Key Midsquare
Implementasi Algoritma Fungsi Hash Grostl Untuk Mendeteksi Orisinalitas Citra Digital Wahyu Satria Putra Zega; Herry Sunandar; Suginam Suginam
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 4, No 1 (2020): The Liberty of Thinking and Innovation
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v4i1.2709

Abstract

Image modification is the process of manipulating part or all of the image area with the help of digital image processing techniques. Image fakes are generally difficult to analyze with the naked eye because the resulting image from the image modification process is difficult to distinguish with the naked eye. The ease of creating and changing an image can damage the credibility of the authenticity of the image in various aspects, thus making it prone to be used for criminal acts because image changes in digital images can change the information conveyed to be different. This is the basis of this research to detect the authenticity of an image. The Grostl method is a hash function to detect changes in digital images, the Grostl hash function is used to determine whether an image has been modified or not. The application of the Grostl method to generate a hash code from a digital image begins by inputting the digital image as the object to be hashed.Keywords: Image Originality, Hash, Grostl
Pengklasteran Gaji Karyawan Pada Pt. Erba Primas Bogor Menggunakan Algoritma K-Medoids Theresia Siburian; Suhada Suhada; Ilham Syahputra Saragih; Irfan Sudahri Damanik; Dedi Suhendro
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 4, No 1 (2020): The Liberty of Thinking and Innovation
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v4i1.2852

Abstract

PT. Erba Primas is located in Bogor, West Java and is part of the steel production industry. Inside PT. Erba Primas Bogor, there are several sections, among others, namely: Accounting Section, Administration Section, Human Resource Department (HRD), Logistics Section, Production Section Penjualan Sales and Purchasing Parts. In this study the authors found problems at PT. Erba Primas is specifically the accounting section where in classifying salaries to employees. So the authors use Datamining with the K-Medoids algorithm to facilitate decision making. K-Medoids Clustering Algorithm or also known as Partitioning Around Mendoid (PAM) Algorithm is an algorithm that uses partitioning clustering method to group n sets of objects into a number of k clusters. This algorithm uses objects in a group of objects to represent clusters. In this study aims to determine the salary clusters at high and low levels. The data source used was taken from PT. Erba Primas Bogor in 1 year. The number of records used by 100 employees and divided into two clusters, namely high and low. Based on calculations using the k-medoids algorithm the results of a high cluster of 6 employees and a low cluster of 94 employees. This research can be used as input to the company in an effort to help regulate the salary funds budget for employees and besides that in classifying employee salary data is done more  more effectively and efficiently.
Implementasi Algoritma K-Medoids Untuk Mengelompokkan Limbah Pabrik Yang Berbahaya (Studi Kasus: PT.Indowastek) Almendo Hidac Rislen Sihite
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 4, No 1 (2020): The Liberty of Thinking and Innovation
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v4i1.2647

Abstract

Waste is waste material resulting from human activities that has no economic value. Waste has types, namely: liquid waste, gas waste, solid waste, and hazardous waste, where the most dangerous waste for humans is hazardous waste. Data mining is the process of recognizing an interesting knowledge of the amount of data in the database and so that a pattern is obtained that has a method, one of the K-Medoids algorithms. The result of this research is where a hazardous factory waste can be grouped into harmful wastes in the company PT. Indowastek with the K-Medoids algorithm, if the company has no problem determining these wastes with this algorithm makes it easier for PT Indowastek.Keywords: K-Medoids Algorithm, Data Mining, Waste, Hazardous
Implementasi Multifactor Evaluation Process (MFEP) Pada Pemilihan Foundation Bagi Perias Pemula Mawaddah Anjelita; Eka Irawan; Agus Perdana Windarto; Dedy Hartama; Irfan Sudahri Damanik
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 4, No 1 (2020): The Liberty of Thinking and Innovation
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v4i1.2697

Abstract

Abstract−This study aims to provide input, especially for novice make-up in choosing the best foundation, considering that foundation is one of the main components in make-up which is very influential in the perfection of make-up. The algorithm used in this study is the Multifactor Evaluation Process (MFEP). There are 5 factors used in the selection foundation, namely the durability of the foundation, the age of the product, the price, the color variants presented, and the coverage or ability of the foundation to cover deficiencies in the face. The foundation products used in this research are Lt-Pro Smooth Corector, Kryolan, Ultima II, Naturactor, and Este Lauder. The implementation of the Multifactor Evaluation Process (MFEP) in the selection of foundations for beginners can be applied. The result was that Kryolan foundation could be an alternative for beginners who were confused in choosing a foundation. The second order was obtained by Naturactor Foundation.Keywords: MFEP, Decision Support System, Multifactor Evaluation Process, Selection of Foundation, SPK
Kompresi File Aplikasi Hadist Dengan Menggunakan Algoritma Punctured Elias Code Dewianingsih Yuni
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 4, No 1 (2020): The Liberty of Thinking and Innovation
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v4i1.2721

Abstract

The size of the application file is sometimes relatively large, where the better the quality of the application file, the larger the file size needed to store the application file. With a very large application file size, during the transfer process, the transfer process may fail because the media storage space exceeds the limit. The solution to this problem is that the application files can be compressed in order to speed up transferring and storing application files. Compression of application files can be done by reducing the size of the application files by reducing the bits in the application files, but not eliminating or creating corrupted application files. By compressing, large data will be reduced in size so as to save storage space. In this study, the algorithm used is Punctured Elias Code, by using this algorithm, the compression results of the values have different results for each value, and the compression results will make sending and moving application files easier.Keywords: Compression, Files, Hadith Applications, Algortima Punctured Elias Code.