KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer)
Jurnal KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) adalah wadah publikasi bagi peneliti dalam bidang kecerdasan buatan, kriptografi, pengolahan citra, data mining, system pendukung keputusan, mobile computing, system operasi, multimedia, system pakar, GIS, jaringan computer.
Articles
600 Documents
SISTEM PENDUKUNG KEPUTUSAN PEMILIHAN PERSONIL DITRESKRIMSUS BERPRESTASI MENERAPKAN METODE VIKOR (STUDI KASUS: POLDA SUMUT)
Retnowati Sitanggang;
Garuda Ginting
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 2, No 1 (2018): Peranan Teknologi dan Informasi Terhadap Peningkatan Sumber Daya Manusia di Era
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v2i1.959
The North Sumatra Police Board award team headed by the Deputy Chief of Police conducted the election of Ditreskrimsus personnel each month by giving awards to personnel / apparatuses who had real and extraordinary achievements whose results could be proud of and beneficial for the advancement of institutional quality improvement. Decision support systems or often referred to as Multi Criteria Decision Making (MCDM) function to carry out the selection process and assist someone in making accurate and targeted decisions. One method in the MCDM is Vlsekriterijumska Opimizacija I Kompromisno Resenje (VIKOR). Where this method is used to select more than one criterion and has advantages in compromising existing alternatives, then the best results selection process will be carried out, and can complete discretionary decision making. The purpose of this study is to apply the VIKOR method in making decision-making decisions for outstanding personnel in Ditreskrimsus.Keywords: decision support system, ditreskrimsus, vikor
MENDETEKSI ORISINALITAS CITRA DIGITAL DENGAN MENERAPKAN METODE ADLER-32
Jelita Lahagu
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v3i1.1694
The development of digital images is now very rapid, where the processing of image data, documents on digital images make images easily created or manipulated easily, even without leaving a visual imprint for users to manipulate an image. The ease in making and changing an image can damage the credibility of the originality / authenticity of the image in various aspects.Image is a combination of points, lines, shapes and colors to create an imitation of an object. Based on this, the pixel changes the original image so that it does not indicate the original image or the image has been manipulated. Thus the detection of the image can be known the authenticity of an image using the Adler-32 Algorithm. Small changes of pixels do not make the image content detected by the human eye. This is explained in pixels like the long width in the image. The basis of this research is to detect the originality or authenticity of a digital image. Keywords : Image, Originality, Manipulation, Adler-32
IMPLEMENTASI ALGORITMA ADVANCED ENCRYPTION STANDARD DAN TRIPLE DATA ENCRYPTION STANDARD UNTUK MENGAMANKAN CITRA DIGITAL
Mahadi Winafil;
Sinar Sinurat;
Taronisokhi Zebua
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 2, No 1 (2018): Peranan Teknologi dan Informasi Terhadap Peningkatan Sumber Daya Manusia di Era
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v2i1.975
Digital images that are personal and confidential are very vulnerable to wiretapping by irresponsible parties. Especially if distributed via the internet network such as on Facebook, WhatsApp and e-mail chat based applications. Images that are sent sometimes are often confidential images and must be maintained. In order to maintain the security of digital images can be done by utilizing cryptographic techniques. Cryptographic techniques can secure digital images by changing pixel values from digital images so as to produce different pixel values from the original image to be secured. This research will use AES 128 bit and Triple DES methods for encryption and decryption of digital images on client-server based applications. The results of the encryption AES algorithm will be re-encrypted with the Triple DES Algorithm so as to produce pixel values that are far different from the original pixel values. Keywords: cryptography, image, AES, Triple DES
PEMANFAATAN MODEL SCRUM PADA METODELOGI FAST DALAM PENGEMBANGAN SISTEM INFORMASI AKADEMIK DI SEKOLAH
Haida Dafitri;
Marina Elsera
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v1i1.471
Dengan adanya perkembangan informasi dan teknologi yang sangat berkembang pesat membuat banyaknya sekolah menggunakan teknologi tersebut sebagai salah satu pendukung kemajuan sekolah. Beraneka ragam model dan metodelogi yang dapat dimanfaatkan dalam pengembangan sistem informasi akademik yang digunakan. Salah satunya adalah model scrum dan metodelogi fast. Model Scrum digunakan karena dianggap cukup untuk mengelola project pengembangan secara praktikal yang dapat menuntun tim peneliti untuk melakukan hal-hal yang perlu dan menyarankan hal-hal yang diangap tidak perlu dalam menginspeksi proses dan melakukan adaptasi terus menerus untuk mengerjakan proses tahap demi tahap sesuai dengan kebutuhan pihak sekolah. Sedangkan model Fast digunakan dalam pengembangan informasi di sekolah dengan menggunakan teknologi E-SMS. Hasil dari penelitian tersebut agar dapat dilakukannya pengembangan informasi akademik disekolah dengan cara membangun sebuah sistem informasi akademik dengan teknologi E-SMS. Pengembangan ini dilakukan dengan tujuan untuk memudahkan pihak sekolah dalam memberikan informasi akademik dengan mudah kepada siswa atau wali murid, dan dapat mengefektifkan serta mengefesiensi waktu penyampaian maupun biaya pengiriman informasi secara manual maupun penggunaan pulsa bagi wali kelas disekolah.
PERANCANGAN APLIKASI CATALOG WISATA DI SUMATERA UTARA MENGGUNAKAN ALGORITMA RABIN-KARP
Ade Ambarwati Br Ginting;
Dito Putro Utomo
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v3i1.1568
String matching is the process of finding all occurrences of a query or called a pattern into a string or text. String matching is a string or word matching that is used in the problem to find the pattern of string characters in a sentence. String matching is a technique in determining the accuracy of a given text pattern. Attractions in North Sumatra is one of the most popular tourist destinations in North Sumatra, Lake Toba because of the beautiful scenery of many outsiders or foreigners also visit the tour. Lack of information about North Sumatra tourism objects, the authors designed a tourism catalog to help the community in finding the latest attractions in North Sumatra such as natural attractions, historical tourism, religious tourism and many more can we visit the attractions around North Sumatra. The Rabin-Karp algorithm is a hashing function to find patterns in a string. In searching a travel catalog with the Rabin-Karp algorithm, it is very suitable to use because the Rabin-Krap algorithm is used to search for a word contained in a travel search. So that the testing phase requires eclipse software in the design of making travel catalogs.Keywords: String Matching, Attraction, Tourism Catalog, Rabin-Karp Algorithm, Eclipse
PERANCANGAN APLIKASI PENJUALANBUKU ONLINE DENGAN METODE MODEL VIEW CONTROLLER (MVC)
Hendra Cipta;
Abdul Halim Hasugian;
Ali Ikhwan
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v1i1.487
Penjualan buku yang dilakukan secara konvensional tidak terlalu banyak membantu penjualan itu sendiri, ini dikarenakan sulitnya dalam berpromosi. Tidak jarang juga pengusaha akan berpromosi secara langsung mendatangi calon pembelinya, seperti datang kesekolah-sekolah atau pun kerumah-rumah. Yang sudah pasti akan memakan biaya yang cukup besar sedangkan penjualannya belum tentu berhasil. Itulah mengapa cara konvensional dalam penjualan buku ini mulai ditinggalkan para pengusaha. Sekarang ini pengusaha mulai banyak beralih berbisnis melalui internet. Seperti halnya penjualan buku, ini di karenakan penjualan buku secara konvensional banyak mengalami kendala. Perancangan aplikasi dengan menggunakan CMS joomla ini akan menggunakan metode Model View Controller sebagai pengatur tampilan dari pada perancangan tersebut
SISTEM PENDUKUNG KEPUTUSAN REKOMENDASI CALON KEPALA PUSKESMAS MENGUNAKAN METODE MULTI ATTRIBUTE UTILITY THEORY (MAUT) (STUDI KASUS: PUSKESMAS DESA LAMA SEI LEPAN)
Jamillah Nasution;
Muhammad Syahrizal
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v3i1.1586
Desa Lama Health Center is a community health service center for first aid for local communities who want to seek treatment or consult about their health, which serves all public health problems in the fields of childbirth, treatment, outpatient care, hospitalization, baby posyandu and so forth. Decision Supporter. The problems faced by the Old Village Health Center are still using manual methods, especially in determining the recommendation of candidates for Head of the Health Center. On this occasion the authors propose to make decisions for the selection of candidates for the head of the puskesmas using Microsoft Visual Studio 2008. From the results of prospective head centers using the Decision Support System by using the multi attribute utility theory(MAUT) method to facilitate employed in datermining the best decisions in Puskesmas Desa Lama Sei Lepan.Keywords: SPK Recommendation of Candidate Head of Puskesmas, MAUT
SISTEM PENDUKUNG KEPUTUSAN KELAYAKAN PESERTA UNTUK MENGIKUTI PROSES PELELANGAN BARANG DAN JASA PADA PEGADAIAN MENERAPKAN METODE EXPROM II
Ageng Puspita Pratidina;
Mesran Mesran;
Permanan Ginting
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v1i1.505
Auction of goods and services is a common thing done by the Pawnshop and this is done by the Pawnshop if the pawnshop is no longer able to pay off the mortgaged goods. Under the mortgage law, the prospective borrower has an obligation to surrender his property as collateral to the pawning party. The law also contains the purchase of the right to the remuneration to make a sale (auction) on the guarantee if the deadline for the loan is exhausted and the borrower can not redeem his guarantee. The process of determining the eligibility of the participants is still conventional so it requires a good decision support to choose the winning bidder. The application of EXPROM II method in information system based on decision support system is able to determine the eligibility of bidders.
IMPLEMENTASI ALGORITMA PAILLIER CRYPTOSYSTEM PENGAMANAN CITRA DIGITAL PADA APLIKASI CHAT
Juni Ade Nawer Purba;
Taronisokhi Zebua;
Rivalri K Hondro
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v3i1.1605
Chat application allows easily users to exchange information in the form of text, images, video and audio. Information that is distributed can be either confidential or not confidential. However, at this time there is often attack on to information that is communicated through communication media such as chat, so that it is possible for other people to misuse the information. The use of algorithms from cryptographic techniques in securing distributed information. This research discusses how to use the cryptosystem pailler algorithm to secure digital images that are distributed through chat applications. This algorithm is very resistant to solving because n-residue class calculations are believed to be very difficult to compute, so as to maintain the security of images distributed through chat applications.Keywords: Cryptography, Paillier Cryptosystem, Chatting, Digital Image, Communication
ANALISA DAMPAK BENCANA ALAM PADA HUTAN DENGAN ALGORITMA C5.0 STUDI KASUS DINAS KEHUTANAN PROVINSI SUMATERA UTARA
Deviana Christiani Simanjutak
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/komik.v3i1.1621
The North Sumatra Provincial Forestry Service is a regional apparatus that carries out provincial and district / city regional government affairs in the forestry sector. In the North Sumatra Provincial Forestry Service there were natural disasters. Natural disasters are events or series of events that threaten and disrupt people's lives and livelihoods caused, both by natural and / or non-natural factors as well as human factors, resulting in human casualties, environmental damage, property losses, and psychological impacts. In natural disasters in forests, it is difficult to identify data in determining the magnitude or impact of natural disasters on forests. Handling the impact of natural disasters can be done with the concept of data mining to produce information large or small the impact of existing natural disasters and to help decision making. To produce a decision, the C5.0 algorithm is used, the C5.0 algorithm is an algorithm to make it easier to determine the impact of natural disasters on forests in the North Sumatra Province Forestry.Keywords: Forestry Service, Data Mining, Algoritma C5.0