cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
ijics.stmikbudidarma@gmail.com
Editorial Address
Jalan Sisingamangaraja No. 338, Simpang Limun, Medan, Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
The IJICS (International Journal of Informatics and Computer Science)
ISSN : 25488449     EISSN : 25488384     DOI : https://doi.org/10.30865/ijics
The The IJICS (International Journal of Informatics and Computer Science) covers the whole spectrum of intelligent informatics, which includes, but is not limited to : • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High Performance Computing • Information storage, security, integrity, privacy and trust • Image and Speech Signal Processing • Knowledge Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles 5 Documents
Search results for , issue "Vol 4, No 2 (2020): September 2020" : 5 Documents clear
Application of Data Mining to Predict Procurement of Office Writing in Al-Ikhwan Middle School using Naïve Bayes Method Aida Sopia; Muhammad Syahrizal
The IJICS (International Journal of Informatics and Computer Science) Vol 4, No 2 (2020): September 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (833.302 KB) | DOI: 10.30865/ijics.v4i2.2119

Abstract

Office stationery (ATK) is now a necessity for almost everyone, especially for corporate instances or educational institutions. The need for office stationery is often an unexpected need to buy, this is what makes some educational institutions overwhelmed in doing their work, when they find out their office stationery is out of stock, so it is not uncommon to make work in company or institutional instances education is not completed on time, one of the ways to be more efficient is by implementing data mining to predict the purchase of office stationery (ATK) at the company or educational institution's intents, especially at the AL IKHWAN Middle School in Tanjung Morawa. The Naive Bayes method is used to analyze data in pattern recognition and predict purchase of office stationery (ATK) at AL IKHWAN Middle School in Tanjung Morawa. The data needed is the data for the purchase of office stationery (ATK) last month as test data, calculated from the date of the first purchase until the expiry date of office stationery (ATK) at AL IKHWAN Middle School in Tanjung Morawa. The results of this study are to be able to predict whether the office stationery (ATK) at AL IKHWAN Middle School in Tanjung Morawa can be bought back, or it can still be used for a long time, and if more than four types of stationery at the AL IKHWAN Middle School in Tanjung Morawa the lack of writing instruments from the two then the purchase of new stationery is feasible to do, from the amount of data occurring out of stationery
Implementation of Zhu Takaoka Algorithm in Android-Based Restaurant Mobile Applications Abdul Wahab Nainggolan; Guidio Leonarde Ginting
The IJICS (International Journal of Informatics and Computer Science) Vol 4, No 2 (2020): September 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (305.009 KB) | DOI: 10.30865/ijics.v4i2.2117

Abstract

Competition of fast food restaurants at this time is getting tougher, this can be seen from the development of several fast food restaurants or fast food restaurants that exist, including Kentucky Fried Chicken, California Fried Chicken, Mc Donalds, New York Chicken, and Texas Chicken. This makes all restaurants competing in attracting consumers to buy products from the restaurant. Various efforts have been made ranging from opening branches, offering saving packages to consumers, and adding new types of food. Fast food can be interpreted as food that can be prepared to be served and consumed in a short time and can be eaten quickly. Ordering food and drinks is preferred at the current restaurant. The process of choosing food and beverage menus that are currently running at Garuda restaurants is still using menu books, menu books containing a large number of food and beverage menus, many menus are a problem for consumers because consumers find it difficult to find food and beverage menus quickly. And for the way to choose the menu itself, still see the list of food and beverage menu
Middle Square Method Analysis of Number Pseudorandom Process Arif Budiman; Efori Bulolo; Imam Saputra
The IJICS (International Journal of Informatics and Computer Science) Vol 4, No 2 (2020): September 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (352.086 KB) | DOI: 10.30865/ijics.v4i2.1386

Abstract

Random numbers can be generated from a calculation of mathematical formulas. Such random numbers are often referred to as pseudo random numbers, random numbers are used for various algorithms, especially cryptographic algorithms such as AES, RSA, IDEA, GOST that require the use of Middle-Square Method random numbers which is very useful for adding research references to algorithms concerning random number generator and better understand how random numbers are generated using the Middle-Square Method algorithm. Both data collection and report making as for the objectives achieved in the form of understanding random numbers and knowing the algorithm process, compile a program designed to be used as an alternative to random numbers for various purposes, especially in cryptographic algorithms.
Design of Steganographic Applications in A Processed Image using Algorithm Dynamic Markov Compression Akmal Dirgantara Lubis; Garuda Ginting; Fadlina Fadlina
The IJICS (International Journal of Informatics and Computer Science) Vol 4, No 2 (2020): September 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (394.818 KB) | DOI: 10.30865/ijics.v4i2.2120

Abstract

Confidential text data is an important matter that needs to be protected and kept confidential. Secret text data is a treasure where many people who want to try to find out first find out its contents. Therefore it is not uncommon for crimes to appear intentionally committed by irresponsible people. With the increasing number of people who commit crimes who deliberately steal confidential data and damage confidential text data so that it can harm certain parties. There have been several attempts to deal with the issue of security of confidential data sent over the internet, including using cryptographic and steganographic techniques
Implementation of LCM (Linear Congruent Method) Method in Region Song Game Addinul Arfansyah Harahap; Nelly Astuti Hasibuan
The IJICS (International Journal of Informatics and Computer Science) Vol 4, No 2 (2020): September 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (378.932 KB) | DOI: 10.30865/ijics.v4i2.2118

Abstract

The Regional Song Game is a game that educates players to hone the ability of knowledge about folk songs in the form of questions given the Regional Song game. With the game Regional Songs, players can expand the ability of players about the knowledge of regional songs. Aside from being a means of entertainment, games can also be an exciting learning medium and do not make players bored, so it becomes a pleasant learning atmosphere. The linear congruent method (LCM) is a random number generator method that is widely used by computer programs. The application of the Linear Congruent Method (LCM) in the Regional Song game is intended to randomize the questions that will be displayed by the Regional Song game. Regional Songs Game is an application designed to provide insights about folk songs for the players. This game aims to reintroduce folk songs to the people lost by the ages.

Page 1 of 1 | Total Record : 5