cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
-
Journal Mail Official
ejurnal.stmikbudidarma@gmail.com
Editorial Address
-
Location
Kota medan,
Sumatera utara
INDONESIA
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer)
ISSN : 25974610     EISSN : 25974645     DOI : -
Jurnal KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) adalah wadah publikasi bagi peneliti dalam bidang kecerdasan buatan, kriptografi, pengolahan citra, data mining, system pendukung keputusan, mobile computing, system operasi, multimedia, system pakar, GIS, jaringan computer.
Arjuna Subject : -
Articles 600 Documents
Kompresi File Dokumen Menggunakan Algoritma Boldi-Vigna Codes Siti Maria Br Pandia
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 6, No 1 (2022): Challenge and Opportunity For Z Generation in Metaverse Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v6i1.5763

Abstract

At this time, files of the DOCX type are widely used by people among office workers and also among students, a document file is a file that is used to store important files and then stored on a computer. it is also easy to search by typing the attribute or name created by the user. The size of a file that will be stored greatly affects storage space, which if the size of the file stored is large, the storage space must also be large, such as document files, the more content in a document, the larger the document size. The solution to overcome problems like this is to perform data compression techniques. Data compression aims to reduce a file size which can reduce the bit size in each document file, but does not eliminate the information data in it. By compressing, large data will be reduced in size so as to save storage space. In this study the algorithm used is the boldi-vigna codes algorithm, the compression results will benefit and storing document files will be easier.
Penerapan Algoritma K-Medoids Pada Pengelompokan Penerima Dana Bantuan Sosial Kelurahan Medan Sinembah Sylvia Situmorang; Rivalri Kristianto Hondro; Sumiati Sumiati
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 6, No 1 (2022): Challenge and Opportunity For Z Generation in Metaverse Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v6i1.5721

Abstract

Social assistance is generally part of government programs to support minimum sources of income for poor families. To avoid the uneven distribution of social assistance funds provided, it should be noted that the grouping of data on the population of recipients of social assistance funds aims to make the distribution of social assistance funds right on target to people in need and also so that the distribution of social fund assistance is not misused by parties or individuals who are not responsible for the distribution process. Therefore, a technique or method is needed that can be used to help speed up the process of grouping recipients of social assistance funds and get accurate results so that the funds distributed are not misdirected and the technique is commonly referred to as data mining. The K-Medoids algorithm is one of the algorithms that can be used in data mining for clustering or grouping based on certain criteria. For this reason, it is very suitable to use the K-Medoids algorithm for grouping the economic level of the community, where data from each occupation of Medan Sinembah village is used as a criterion.
Implementasi Algoritma Rice Code dan Ternary Comma Code Pada Kompresi File PDF Ade Novian Purnama
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 6, No 1 (2022): Challenge and Opportunity For Z Generation in Metaverse Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v6i1.5787

Abstract

Currently, the source of information obtained is not only through print media but also electronic media such as e-books (digital books). E-books can be accessed on laptops, tablets, smartphones and other electronic media. Usually the e-book file used is with a PDF extension. PDF as an eBook extension has its deficiency. The deficiency of PDF is a format that does a little compresion, causing e-books with PDF extensions to have a fairly large size. This causes the process of reading data and sending data takes quite a long time, and often fail during the delivery process.To solve the size of the PDF file that is large enough, compression process is required. Compression is a new data compression process that has a smaller size in the form of a character set with the aim of saving storage space requirements and speeding up the data scanning process. Therefore, the Rice Code and Ternary Comma Code algorithms are used, both of which are applied sequentially (double compression) so that files can be compressed with a maximum size.The final result of the double compression process by the Rice Code and Ternary Comma Code algorithms carried out by the author obtained a Compression Rate (CR) value of 20%, which means that the initial PDF file size can be compressed until its size only reaches 20% of the original PDF file size
Deteksi Berita Palsu Tentang Vaksinasi Covid-19 Dengan Menggunakan Text Mining Dan Algoritma Cosine Similarity Diana Marta; Guidio Leonarde Ginting; A.M Hatuaon Sihite
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 6, No 1 (2022): Challenge and Opportunity For Z Generation in Metaverse Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v6i1.5738

Abstract

Indonesia is currently experiencing an outbreak of a global virus called COVID-19. A lot of the fake news currently spreading on social media is news about vaccinations. The truth of spreading fake news should be detected by applying one of the information technologies, namely natural language processing (NLP). The algorithms that will be used to support fake news detection are text mining algorithms and cosine similarity algorithms. Looking for references related to the problem, starting from looking for books that discuss the algorithm used in this research. Looking for data related to the research topic, namely the COVID-19 vaccination. Data processing is done by applying a text mining algorithm as text processing. The stages of text mining are case folding, tokenizing, filtering, stemming. The processing analysis stage is carried out by applying the cosine similarity algorithm to analyze the level of similarity between data. Based on the calculation using the cosine similarity algorithm above, Q (detected news) has a similarity value of above 40% to D31 and D59, where the labels that have been made on D31 and D59 news data are hoax news. The probability of news appearing using a mathematical formula to calculate the probability, the probability value obtained by Q (news detected) is 100% hoax and 0% fact. Based on the results of the analysis of the data by applying the text mining and cosine similarity algorithms, the results show that the identified news is declared a hoax according to the data held.
Analisis Perbandingan Algoritma Discrete Cosine Transform (DCT) Dan Run Length Encoding Pada Kompresi File Mp4 Ananda Mulia
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 6, No 1 (2022): Challenge and Opportunity For Z Generation in Metaverse Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v6i1.5718

Abstract

Technological development is one of the important aspects in the world of technology information. Many algorithms have been developed to compress files, including Discrete Cosine Transform algorithm and Run Length algorithm encoding. This lesson presents a comparative analysis of the two algorithms based on compressed video files in mp4 file format. This research analysis aims to provide knowledge about which algorithm is more effective between the two algorithms so that space faster file storage and delivery times. Among them Discrete Cosine Transform and Run Length Encoding With Some of these algorithms need to be chosen a more appropriate algorithm so it is necessary to compare the compression algorithms. The exponential method is the one that allows to do comparative analysis of the two algorithms. Thus, we can see which algorithm is more effective and faster to compress mp4 video files.
Implementasi Metode Waspas Dalam Menyeleksi Posisi Chief Staff Pada Pt. Codinglab Dengan Metode Pembobotan Roc Amanudin Harahap
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 6, No 1 (2022): Challenge and Opportunity For Z Generation in Metaverse Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v6i1.5691

Abstract

PT. CodingLab Medan within a certain period of time always evaluates the performance of its employees. The results of the performance appraisal will then be processed in the selection of promotions, including the position of Chief Staff. However, in evaluating the performance appraisal of PT. CodingLab employees, the process is still done manually (based on the owner's assessment). So that the results of the assessment can result in an inaccurate and subjective assessment. Based on the problems described above, a Decision Support System (DSS) is needed which is expected to help existing problems because of the weight of the values used, the selection process can be more effective and optimal. In addition, SPK makes it easier to evaluate employee performance. The ROC and WASPAS methods are very suitable to be used in the process of selecting employees by developing a website-based information system that makes it easier for users to carry out their activities. The results of this study indicate that with the decision support system (DSS) which was built with a combination of the ROC and WASPAS methods, PT. Codinglab Medan can conduct an assessment of employees so that they can select the position of chief staff more quickly, precisely and objectively.
Sistem Pendukung Keputusan Rekomendasi Penerimaan Bantuan Beasiswa Kurang Mampu Dengan Menerapkan Metode Ocra Dan Pembobotan Roc Pada Sekolah YapimMedan Marta Zega; Muhammad Syahrizal; Ilhamsyah Ilhamsyah
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 6, No 1 (2022): Challenge and Opportunity For Z Generation in Metaverse Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v6i1.5731

Abstract

Scholarship assistance is educational assistance organized by the government, foundations or companies to help ease the burden on underprivileged students so they can continue their education and to improve the quality of human resources through education. YAPIM SMA provides scholarships to underprivileged students every year. To get the scholarship, the school sets several criteria for which students can be recommended and are entitled to receive scholarship assistance for the underprivileged. These criteria will later help the school in determining which students are entitled to get scholarships for underprivileged students. To make it easier for schools to determine students who are entitled to scholarships, it is necessary to have a decision support recommendation system that functions to help select prospective scholarship recipients who are less fortunate. In this study the authors applied the OCRA method for ranking values and the order centroid ranking method ( ROC) for the results of weighting at YAPIM schools. By implementing this decision support system, the school can easily determine students who are entitled to get underprivileged scholarships. The assessment runs objectively, accurately.
Penerapan Metode Advanced Encryption Standard (AES) Pada Keamanan Password Server Cloud Universitas Budi Darma Wahyudi Wahyudi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 6, No 1 (2022): Challenge and Opportunity For Z Generation in Metaverse Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v6i1.5769

Abstract

Today's technological developments are increasingly rapid and easy to find and apply in various aspects of personal, social, cultural and business life which greatly impact changes in human attitudes and behavior. The things that are expected from technological developments are certainly to facilitate human work in assisting conventional activities which are now being replaced with technological conveniences that continue to develop. However, along with the development of technology, there is a negative side that could encourage people to carry out various kinds of criminal threats that can attack when the software development process occurs, including theft and manipulation of software data that is being developed which causes material losses and financial. One effort to reduce the level of threat risk is by implementing cryptography. Cryptography is a method or technique that contains various mathematical calculations to overcome the problem of data theft in software. Regarding the issue of data security, cloud server password security is no exception, which in this case is deliberately discussed in the Budi Darma University cloud server password security. The cryptographic method used in the Cloud Server password security research at Budi Darma University uses the Advanced Encryption Standard (AES) method which is the current standard symmetric key algorithm with a key length of 128 bits. In 128-bit AES, 1 128-bit plaintext block is first converted into a 4 x 4 hexadecimal matrix called state, each state element is 1 bit in size. The process carried out in this study is to analyze the encryption and decryption process using advanced encryption standard algorithms or what is often referred to as the Advanced Encryption Standard (AES). With this encryption method, the cloud server at Budi Darma University can be encrypted by the user into data that cannot be read by anyone so that the security and confidentiality of the data can be maintained properly and safely.
Perancangan Sistem Informasi Desa Menggunakan Model Prototyping Supiyandi Supiyandi; Chairul Rizal; Barany Fachri; Rian Farta Wijaya; Eko Hariyanto
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 6, No 1 (2022): Challenge and Opportunity For Z Generation in Metaverse Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v6i1.5811

Abstract

North Sumatra is home to the settlement of Lau Gumba. As a hamlet, there is still information that has not been widely disseminated by electronic means of communication. Designing an information system is important as a result. The use of technology has transformed how people obtain information and data. In both public and private institutions, technology helps organize management systems and labor processes. The usage of the Village Information System is one of the uses of information technology in village life (SID). This village information system was created utilizing the prototyping process, which is common for creating village information systems. As a result, a prototype model for a website-based savings and loan application was created. For the purpose of gathering data, observations, interviews, and literature reviews were made. The administration level of access is provided by the design of the village information system, and it includes entity relationship diagrams in the database design in addition to analysis, design, coding, and testing services. The availability of a website-based village information system would make it easier for village officials to process village information data and provide information on village government in Lau Gumba Village more effectively and efficiently.Additionally, researchers introduced components of widely informed activities. As a way of information in web development in Lau Gumba Village utilizing the prototype approach in design, the village information system is outfitted with a web-based display so that users can modify the content in the system. 
Meningkatkan Unjuk Kerja Akses Data Pada Aplikasi Berbasis Web Katon Wijaya; Gabriel Indra Widi Tamtama
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 6, No 1 (2022): Challenge and Opportunity For Z Generation in Metaverse Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v6i1.5781

Abstract

Web programming has become even more efficient when there are now jQuery plug-ins available. However, when the size of the database is very large, the performance of the web-based application decreases greatly. In a retail business, the search for available goods data is very necessary, if the data downloaded is limited in number there is a risk that the item sought will not be found. To improve the performance of web-based applications, a method will be made so that restrictions on the amount of data downloaded can be carried out but the search for the desired item data can still be found, so that the application program can display data with the search feature provided by the jQuery plug-in but can respond to user needs quickly. The method used in this research is a filtering technique by utilizing the multilevel Sequential Query Language (SQL) feature, so that the displayed data can be significantly reduced so that data access performance will increase. From this research, it is evident that with the multilevel filtering technique, the item data you are looking for can easily be found and can be displayed quickly using the jQuery Data Table plugin, so that programming becomes very efficient.