cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
ijics.stmikbudidarma@gmail.com
Editorial Address
Jalan Sisingamangaraja No. 338, Simpang Limun, Medan, Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
The IJICS (International Journal of Informatics and Computer Science)
ISSN : 25488449     EISSN : 25488384     DOI : https://doi.org/10.30865/ijics
The The IJICS (International Journal of Informatics and Computer Science) covers the whole spectrum of intelligent informatics, which includes, but is not limited to : • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High Performance Computing • Information storage, security, integrity, privacy and trust • Image and Speech Signal Processing • Knowledge Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles 122 Documents
Sequitur Algorithm For Particular Character Compression Or Words Always Returned Efori Buulolo
The IJICS (International Journal of Informatics and Computer Science) Vol 1, No 1 (2017): March 2017
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (311.835 KB) | DOI: 10.30865/ijics.v1i1.344

Abstract

Character pairs or recurrent words are often found on large documents. The document uses a large space in storage. At this time the storage with a large amount of space is not a problem anymore, with the availability of various media types of large data storage media and the price is very affordable. Although in the form of storage media is not a problem but in the storage and transmission of data, a large document would need an efficient for storage space and so does the case of data transmission. The Sequitur algorithm is one suitable algorithm for concluding context-free grammar into a compression to reduce repetitive input. The Sequitur algorithm is perfect for large document compression with paired or repeated characters so that the document uses more efficient storage space in the case of data transmission
Implementation of K-Means Methods In Clustering Students Ability Levels in English Language Cahyo Prianto; Rd Nuraini; Andi Tenri Wali
The IJICS (International Journal of Informatics and Computer Science) Vol 3, No 2 (2019): September 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (347.393 KB) | DOI: 10.30865/ijics.v3i2.1382

Abstract

Nowadays, English extremely needs to be controlled, especially students, in communicating and reading also understanding literature written in English. In achieving mastery of English, the students, in this case, the students who are not majoring in English are given a common base subject of English. In Politeknik Indonesia, especially majoring in a Bachelor's Degree in Informatics Engineering, teaching English is using the direct method, to find out the results of teaching English within three semesters. Therefore, by doing this research for classifying the level of ability of students into three categories, they are Beginner, intermediate and advanced. The objective of the grouping is to determine how many students who have the capability level is low, medium and high so that the faculty can determine the average level of students' proficiency and the lecturers can intervene to conduct teaching in developing the students' knowledge of English. The classification used the K-Means clustering algorithm, which is one algorithm that classifies the same data on specific groups and different data in the other group. The results of this study by applying the k-means clustering method is the researchers can classify the students based on students' ability levels either they are beginner, intermediate or advanced.
Implementation of Weight Sum Model(WSM) in the Selection of Football Athletes Lince Tomoria Sianturi
The IJICS (International Journal of Informatics and Computer Science) Vol 3, No 1 (2019): March 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (237.988 KB) | DOI: 10.30865/ijics.v3i1.1358

Abstract

Every soccer team has a standard that is used by coaches in determining athletes that fit the criteria owned by athletes. In this study, researchers used a decision support system (SPK) with the Weight Sum Model (WSM) method, which assesses the results of the criteria needed in the selection of soccer athletes. Decisions made in applying the WSM method will produce recommendations according to the standards used by the trainer. The purpose of this research is to apply the WSM method in selecting soccer athletes based on the desired category. The existence of this system is expected to make selection more objective for trainers in making decisions
Design of Steganographic Applications in A Processed Image using Algorithm Dynamic Markov Compression Akmal Dirgantara Lubis; Garuda Ginting; Fadlina Fadlina
The IJICS (International Journal of Informatics and Computer Science) Vol 4, No 2 (2020): September 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (394.818 KB) | DOI: 10.30865/ijics.v4i2.2120

Abstract

Confidential text data is an important matter that needs to be protected and kept confidential. Secret text data is a treasure where many people who want to try to find out first find out its contents. Therefore it is not uncommon for crimes to appear intentionally committed by irresponsible people. With the increasing number of people who commit crimes who deliberately steal confidential data and damage confidential text data so that it can harm certain parties. There have been several attempts to deal with the issue of security of confidential data sent over the internet, including using cryptographic and steganographic techniques
Indonesian Proverbs Application Design by Applying Android Horspool Boyer Moore Algorithm Andri Agus Yahya; Nelly Astuti Hasibuan; Putri Ramadhani
The IJICS (International Journal of Informatics and Computer Science) Vol 2, No 1 (2018): March 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (265.645 KB) | DOI: 10.30865/ijics.v2i1.998

Abstract

Proverbs are words or groups of words which states a purpose or will, circumstance of someone, something, or something that express behavior, actions and things about a person indirectly, but implicitly convey a message that can be understood by both the reader and the listener. String matching is an algorithm to search for all occurrences of short and long strings, and for short strings called patterns and long strings called text. Horspool Algorithm is a simplification of the Boyer-Moore algorithm which in search of text is to search in large text to find the first pattern. Because the text sought can be very large (allowing hundreds of thousands of characters) it is important to use more efficient techniques based on that case, a search application based on android is made to make it easier for someone to find proverbs because not everyone understands this and that makes it more practical and efficient in terms of its use without having to carry proverbs in print media such as books.
Decision Support System for Determination of Village Fund Allocation Using AHP Method Vasma Vitriani Sianipar; Anjar Wanto; M Safii
The IJICS (International Journal of Informatics and Computer Science) Vol 4, No 1 (2020): March 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (350.263 KB) | DOI: 10.30865/ijics.v4i1.2101

Abstract

This study aims to describe the management of the allocation of village funds in physical development in the village of Siborna, Panei Subdistrict, Simalungun Regency and to identify inhibiting factors and supporting factors in managing village fund allocation. The focus of this research is the management of village fund allocations which include: planning, implementation. The determination of the allocation of village funds will later use the Analytical Hierarchy Process (AHP) method with 4 criteria including: villagers, rural poor, village area and Village Geographical Difficulty Index. Alternative Samples in this study were 4 villages, including the villages of Sosor Hamlet, Simpang Bahbirong Hamlet, Hutabagasan Hamlet and Kebun Sayur Hamlet. The results of this study using the AHP method obtained by the Village of Vegetable Farm Village is an alternative with the highest value that is eligible to get a village fund allocation from the government with a value of 3,0000
Application Of Boyer Moore Algorithm for Text Searching Fince Tinus Waruwu
The IJICS (International Journal of Informatics and Computer Science) Vol 1, No 1 (2017): March 2017
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (254.52 KB) | DOI: 10.30865/ijics.v1i1.385

Abstract

Technology at the moment is very rapid development in business, and education. Many developers or application makers are competing in improving science about the science of technology so as not to miss. Technology is an integral part of human life. Computer application is one part that is not separated from the computer. An application is a software that actually works to simplify the job. Thus, at this time already many computer applications are created. In the course, the application software always experienced improvements made by the manufacturer. These improvements lead to improved facilities to make it easier for users to work. In the world of education or the world of work a lot of work done by using computers such as typing by using text editor applications such as Microsoft Word in the manufacture of scientific work or other work, often mistakes in terms of writing words, often mistakes occur not because of intentional but because of community habits In abbreviating words when writing. It is necessary an application that can facilitate the examination of a writing in order to find the wrong word or abbreviated and automatically the application will fix it (text improvement). To make it easier to find the wrong word in the application, it needs string matching technique using Boyer Moore algorithm. The application is built with Microsoft Visual Studio 2008 and MySQL as the. 
How to Create and Randomize a Vegenere Cipher Key Based on the Key Procedure of RC4+ Algorithm Taronisokhi Zebua; Eferoni Ndruru
The IJICS (International Journal of Informatics and Computer Science) Vol 3, No 2 (2019): September 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (368.932 KB) | DOI: 10.30865/ijics.v3i2.1404

Abstract

The security of data not only depends on the complexity of the algorithm used, but one of the more important things to safeguard is key. The vegenere cipher algorithm is one of the common and easy to implement algorithms, but this algorithm is very easy to break with kasiki techniques by analyzing the word of cipher and keyword that have repetitive patterns. The RC4+ algorithm has the advantage of generating and generating fairly random keys. This research describes how to use the RC4+ key generation procedure to create and randomized the keys used in the vegenere cipher algorithm, to decrease recurrence of the same character of the cipher and character of the key
Data Compression Using Stout Codes Surya Darma Nasution
The IJICS (International Journal of Informatics and Computer Science) Vol 3, No 1 (2019): March 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (216.479 KB) | DOI: 10.30865/ijics.v3i1.1362

Abstract

The need for data compression is now very important because it is affected by human nature that tends to collect data and also influenced by the need for a process for fast data transfer because the data size becomes smaller. Now many compression algorithms can be used, one of which is the stout codes algorithm. how the stout code algorithm works by encoding characters that often appear with smaller codes than characters with fewer occurrences. The results of data compression in the form of text with the algorithm of the stout code algorithm is the size of the text data becomes smaller with a compression ratio 60% and space saving 40%.
Implementation of LCM (Linear Congruent Method) Method in Region Song Game Addinul Arfansyah Harahap; Nelly Astuti Hasibuan
The IJICS (International Journal of Informatics and Computer Science) Vol 4, No 2 (2020): September 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (378.932 KB) | DOI: 10.30865/ijics.v4i2.2118

Abstract

The Regional Song Game is a game that educates players to hone the ability of knowledge about folk songs in the form of questions given the Regional Song game. With the game Regional Songs, players can expand the ability of players about the knowledge of regional songs. Aside from being a means of entertainment, games can also be an exciting learning medium and do not make players bored, so it becomes a pleasant learning atmosphere. The linear congruent method (LCM) is a random number generator method that is widely used by computer programs. The application of the Linear Congruent Method (LCM) in the Regional Song game is intended to randomize the questions that will be displayed by the Regional Song game. Regional Songs Game is an application designed to provide insights about folk songs for the players. This game aims to reintroduce folk songs to the people lost by the ages.

Page 3 of 13 | Total Record : 122