cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
ijics.stmikbudidarma@gmail.com
Editorial Address
Jalan Sisingamangaraja No. 338, Simpang Limun, Medan, Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
The IJICS (International Journal of Informatics and Computer Science)
ISSN : 25488449     EISSN : 25488384     DOI : https://doi.org/10.30865/ijics
The The IJICS (International Journal of Informatics and Computer Science) covers the whole spectrum of intelligent informatics, which includes, but is not limited to : • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High Performance Computing • Information storage, security, integrity, privacy and trust • Image and Speech Signal Processing • Knowledge Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles 122 Documents
Decision Support System For The Selection Of The Best Extension Officers Applying The Method Of Additive Ratio Assessment (Case Study: Department Of Agriculture Deli Serdang) Hotni Rotua Br Hutapea
The IJICS (International Journal of Informatics and Computer Science) Vol 3, No 1 (2019): March 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (306.628 KB) | DOI: 10.30865/ijics.v3i1.1355

Abstract

Agricultural extension workers are agents of change directly related to farmers. The selection of instructors so far that takes place at the Deli Serdang Agriculture Office takes a very long process, based on the problem, a decision support system (SPK) is needed that can facilitate the selection of the best instructors by using existing criteria. One method used is Additive Ratio Assessment (ARAS). The ARAS method is able to solve problems in decision making with alternatives and criteria that have been given weight. Research using ARAS ranks the lowest extension to the highest ranking. The best instructor selection system was built using Microsoft Visual Studio 2008 and MySQL as a database.
Implementation of Zhu Takaoka Algorithm in Android-Based Restaurant Mobile Applications Abdul Wahab Nainggolan; Guidio Leonarde Ginting
The IJICS (International Journal of Informatics and Computer Science) Vol 4, No 2 (2020): September 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (305.009 KB) | DOI: 10.30865/ijics.v4i2.2117

Abstract

Competition of fast food restaurants at this time is getting tougher, this can be seen from the development of several fast food restaurants or fast food restaurants that exist, including Kentucky Fried Chicken, California Fried Chicken, Mc Donalds, New York Chicken, and Texas Chicken. This makes all restaurants competing in attracting consumers to buy products from the restaurant. Various efforts have been made ranging from opening branches, offering saving packages to consumers, and adding new types of food. Fast food can be interpreted as food that can be prepared to be served and consumed in a short time and can be eaten quickly. Ordering food and drinks is preferred at the current restaurant. The process of choosing food and beverage menus that are currently running at Garuda restaurants is still using menu books, menu books containing a large number of food and beverage menus, many menus are a problem for consumers because consumers find it difficult to find food and beverage menus quickly. And for the way to choose the menu itself, still see the list of food and beverage menu
Implementation of Base64 Algorithm for Securing SMS on Smartphones Ros Minarni
The IJICS (International Journal of Informatics and Computer Science) Vol 2, No 1 (2018): March 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (176.838 KB) | DOI: 10.30865/ijics.v2i1.819

Abstract

In this study the authors used the base64 algorithm, the Base64 algorithm is one algorithm for encoding and decoding a data using the ASCII format, which is based on 64 base numbers or can be said to be one of the methods used to encode (encode) binary data. The results obtained from the ROSMINARNI text message example were encoded with base64 into Uk9TTUlOQVJOSQ, the application of the Base64 algorithm to secure sms messages was done by creating a cryptographic application with the help of the Java Android programming language, the process of securing SMS messages using the Base64 algorithm can run well and produce difficult ciphertext known by ordinary people
Improving the Quality of Digital Images Using the Image Averaging Method Upa Yuandari
The IJICS (International Journal of Informatics and Computer Science) Vol 4, No 1 (2020): March 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (289.44 KB) | DOI: 10.30865/ijics.v4i1.1982

Abstract

Image is a representation (picture), similarity, or imitation of an object. The use of digital images plays an important role as a form of information due to its advantages. Although it is rich in information, not all images have a good visual appearance. This can be due to interference in the form of noise, color intensity that is too contrasting or blurred. Noise itself is a disturbance caused by distorted digital data received by the image data receiver, starting from the movement during shooting by optical devices such as cameras, the use of optical devices that are not in focus, short lighting thereby reducing the number of photos captured by optical devices, or the weather when shooting. Noise can be removed by using the Image Averaging Method 
Application Of Weight Sum Model (WSM) In Determining Special Allocation Funds Recipients Dikki Handoko; Mesran Mesran; Surya Darma Nasution; Yuhandri Yuhandri; Heri Nurdiyanto
The IJICS (International Journal of Informatics and Computer Science) Vol 1, No 2 (2017): September 2017
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (461.472 KB) | DOI: 10.30865/ijics.v1i2.528

Abstract

In the management of education is not uncommon educational institutions sometimes receive sources of funds from outside, one of which comes from the Department of Education in the implementation of its duty to provide one allocation of funds called Special Allocation Fund (DAK). This assistance is from APBN revenues to areas devoted to schools to help fund special activities such as the addition or improvement of school facilities and infrastructure. The application of this special allocation grantee needs to use a Decision Support System (CMS) to allow decisions to be generated in favor of the DAK beneficiary. In the application of SPK required MCDM method, the Weight Sum Model (WSM), which is a simple method and able to generate ranking from the proposer alternatives in a special allocation fund.
Expert System of Detection Defisiensi Imun Uses K-Nearest Neighbor Method Puji Sari Ramadhan; Tugiono Tugiono; Saiful Nurarif
The IJICS (International Journal of Informatics and Computer Science) Vol 3, No 2 (2019): September 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (308.267 KB) | DOI: 10.30865/ijics.v3i2.1372

Abstract

Immune deficiency is a collection of various diseases which, due to having one or more immune system abnormalities and impairing the functioning of the immune system that are decreasing or not functioning properly, with this condition the susceptibility to infection increases. This disease is mostly suffered by children, this is because the immune system changes in children who have not been able to deal with immune attenuation attacks. For now the number of children who do not get early treatment properly, this is due to a lack of public knowledge about this skin inflammatory disease. Looking at the problems that have been raised, it is necessary to build an Expert System that is able to move expert knowledge into a system of consultation services to detect Immunodeficiency Disease based on clinical symptoms experienced by applying the K-Nearest Neighbor method which functions to process knowledge so that can conclude disease probabilities that refer to the state of the previous diagnosis to be used as an initial diagnostic analysis
Application of Multi Criteria Supporting Elemination and Choice Translation Reality (ELECTRE) Decision in Determining Scholarship Recipients for Employee Children at PT. Nusira Mesran Mesran; Afsah Rizki; Natalia Silalahi
The IJICS (International Journal of Informatics and Computer Science) Vol 3, No 1 (2019): March 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (314.709 KB) | DOI: 10.30865/ijics.v3i1.1356

Abstract

During this time the determination of scholarship recipients for employees' children at PT. Nusira is not so good and is considered not so objective because it is still done by direct election and carried out manually so that it causes nepotism or prioritizes choosing employees who have high positions so that it is not so fair for ordinary employees. Due to the absence of a good system, causing problems to arise in terms of determining the receipt of scholarships for employees' children. Therefore, by using a decision support system based on Elimination and Choice Translation Reality (Electre). It is expected that decision-makers will be helped and reduce existing problems, especially in determining the acceptance of scholarships for employees' children.
Middle Square Method Analysis of Number Pseudorandom Process Arif Budiman; Efori Bulolo; Imam Saputra
The IJICS (International Journal of Informatics and Computer Science) Vol 4, No 2 (2020): September 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (352.086 KB) | DOI: 10.30865/ijics.v4i2.1386

Abstract

Random numbers can be generated from a calculation of mathematical formulas. Such random numbers are often referred to as pseudo random numbers, random numbers are used for various algorithms, especially cryptographic algorithms such as AES, RSA, IDEA, GOST that require the use of Middle-Square Method random numbers which is very useful for adding research references to algorithms concerning random number generator and better understand how random numbers are generated using the Middle-Square Method algorithm. Both data collection and report making as for the objectives achieved in the form of understanding random numbers and knowing the algorithm process, compile a program designed to be used as an alternative to random numbers for various purposes, especially in cryptographic algorithms.
Implementation of Triple Transposition Vegenere Cipher Algorithm and Cipher Block Chaining for Encoding Text Fitarius Humendru; Taronisokhi Zebua
The IJICS (International Journal of Informatics and Computer Science) Vol 2, No 1 (2018): March 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (274.421 KB) | DOI: 10.30865/ijics.v2i1.997

Abstract

Security of confidential text data and personal is very important so that the data is not misused by other parties. Many cryptographic algorithms can be used to secure data to keep the originality of confidential data. This study describes the use of triple transposition vegenere cipher algorithm which is combined with cipher block chaining mode for encoding text data with the aim to optimizing randomize of ciphers generated so that the security of confidential of data text is more optimal
Application of the Hungarian Method for Assigning Workers to Ciptaland Development Wosvo Aritonang; Nelly Astuti Hasibuan; Rivalri Kristianto Hondro
The IJICS (International Journal of Informatics and Computer Science) Vol 4, No 1 (2020): March 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (269.41 KB) | DOI: 10.30865/ijics.v4i1.1983

Abstract

Assignment of workers is something that is needed by the company. But in reality the company is difficult to place its employees in each allocation. However, with the development of existing technology, this can be minimized by calculating the cost of each work and each allocation by utilizing existing data and extraction to produce new knowledge. The application of operational research techniques using the Hungarian method and tested using a system or application as a decision tree to assign some decent workers to be placed on jobs within the company. Therefore the author took the initiative to make a thesis entitled "Application of the Hungarian Method in Assigning Ciptaland Development Workers". The assignment process can show every worker by the company. So that Ciptaland Development can be a reference in making decisions in assigning and allocating workers. In this study, an Assignment model was made to determine the allocation of workers who were fit to be placed. This method is quite efficient in the allocation of workers. In applying this hungarian method can provide solutions or considerations for companies in making decisions 

Page 2 of 13 | Total Record : 122