cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
ijics.stmikbudidarma@gmail.com
Editorial Address
Jalan Sisingamangaraja No. 338, Simpang Limun, Medan, Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
The IJICS (International Journal of Informatics and Computer Science)
ISSN : 25488449     EISSN : 25488384     DOI : https://doi.org/10.30865/ijics
The The IJICS (International Journal of Informatics and Computer Science) covers the whole spectrum of intelligent informatics, which includes, but is not limited to : • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High Performance Computing • Information storage, security, integrity, privacy and trust • Image and Speech Signal Processing • Knowledge Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles 5 Documents
Search results for , issue "Vol 3, No 2 (2019): September 2019" : 5 Documents clear
Implementation of Data Mining Using Naïve Bayes Classification Method To Predict Participation of Governor And Vocational Governor Selection In Jemirahan Village, Jabon District Arif Senja Fitrani; Fajrillah Fajrillah; Wirda Novarika
The IJICS (International Journal of Informatics and Computer Science) Vol 3, No 2 (2019): September 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (447.622 KB) | DOI: 10.30865/ijics.v3i2.1391

Abstract

General Election (ELECTION) is an important political event to determine a leader in a democratic country. The General Election (ELECTION) in East Java which was held on 27 June 2018 yesterday was the election of the Governor and Deputy Governor for the 2019-2024 period. There are two pairs of candidates for Governor and Deputy Governor. Through the General Election (ELECTION) then all parties can be accommodated what they want and aspire to so that a better life can be realized. The community is the determining component of the success or failure of an Election. Therefore, in this study the researcher wanted to examine how the electoral participation in Jemirahan Village, Jabon District by using the classification method, the Naïve Bayes algorithm. To predict the participation of the General Election (PEMILU) in Jemirahan Village, Jabon District, it can be done using the Naïve Bayes Algorithm with 6 predefined variables. The results of the prediction of election participation from the dataset taken were 300 data divided by 2, as many as 65% of 195 training data and 35% of 105 data testing.
Web-Based College Student Assignment File Collection Application Using Google Drive API Khairi Ibnutama; Hendryan Winata; Masyuni Hutasuhut
The IJICS (International Journal of Informatics and Computer Science) Vol 3, No 2 (2019): September 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (326.403 KB) | DOI: 10.30865/ijics.v3i2.1371

Abstract

The use of internet media, especially cloud storage as a practical solution in information and communication should be able to be applied in academics, especially in the scope of teaching and learning. By using cloud storage as a communication medium, especially in sending data in the form of assignments files can facilitate lecturers and students in carrying out one of the mandatory activities in lectures, namely the collection of assignments. The main problem that often occurs is the storage capacity provided by hosting services is very limited, so storing large amounts of files will require large costs as well. Google Drive provides an API driven file storage service that makes it easy for users to create applications that can communicate and interact with 15 GB free storage services. The free service is expected to facilitate teaching and learning activities in lectures, especially in the collection of student assignments
Expert System of Detection Defisiensi Imun Uses K-Nearest Neighbor Method Puji Sari Ramadhan; Tugiono Tugiono; Saiful Nurarif
The IJICS (International Journal of Informatics and Computer Science) Vol 3, No 2 (2019): September 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (308.267 KB) | DOI: 10.30865/ijics.v3i2.1372

Abstract

Immune deficiency is a collection of various diseases which, due to having one or more immune system abnormalities and impairing the functioning of the immune system that are decreasing or not functioning properly, with this condition the susceptibility to infection increases. This disease is mostly suffered by children, this is because the immune system changes in children who have not been able to deal with immune attenuation attacks. For now the number of children who do not get early treatment properly, this is due to a lack of public knowledge about this skin inflammatory disease. Looking at the problems that have been raised, it is necessary to build an Expert System that is able to move expert knowledge into a system of consultation services to detect Immunodeficiency Disease based on clinical symptoms experienced by applying the K-Nearest Neighbor method which functions to process knowledge so that can conclude disease probabilities that refer to the state of the previous diagnosis to be used as an initial diagnostic analysis
Implementation of K-Means Methods In Clustering Students Ability Levels in English Language Cahyo Prianto; Rd Nuraini; Andi Tenri Wali
The IJICS (International Journal of Informatics and Computer Science) Vol 3, No 2 (2019): September 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (347.393 KB) | DOI: 10.30865/ijics.v3i2.1382

Abstract

Nowadays, English extremely needs to be controlled, especially students, in communicating and reading also understanding literature written in English. In achieving mastery of English, the students, in this case, the students who are not majoring in English are given a common base subject of English. In Politeknik Indonesia, especially majoring in a Bachelor's Degree in Informatics Engineering, teaching English is using the direct method, to find out the results of teaching English within three semesters. Therefore, by doing this research for classifying the level of ability of students into three categories, they are Beginner, intermediate and advanced. The objective of the grouping is to determine how many students who have the capability level is low, medium and high so that the faculty can determine the average level of students' proficiency and the lecturers can intervene to conduct teaching in developing the students' knowledge of English. The classification used the K-Means clustering algorithm, which is one algorithm that classifies the same data on specific groups and different data in the other group. The results of this study by applying the k-means clustering method is the researchers can classify the students based on students' ability levels either they are beginner, intermediate or advanced.
How to Create and Randomize a Vegenere Cipher Key Based on the Key Procedure of RC4+ Algorithm Taronisokhi Zebua; Eferoni Ndruru
The IJICS (International Journal of Informatics and Computer Science) Vol 3, No 2 (2019): September 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (368.932 KB) | DOI: 10.30865/ijics.v3i2.1404

Abstract

The security of data not only depends on the complexity of the algorithm used, but one of the more important things to safeguard is key. The vegenere cipher algorithm is one of the common and easy to implement algorithms, but this algorithm is very easy to break with kasiki techniques by analyzing the word of cipher and keyword that have repetitive patterns. The RC4+ algorithm has the advantage of generating and generating fairly random keys. This research describes how to use the RC4+ key generation procedure to create and randomized the keys used in the vegenere cipher algorithm, to decrease recurrence of the same character of the cipher and character of the key

Page 1 of 1 | Total Record : 5