cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
jurikom.stmikbd@gmail.com
Editorial Address
STMIK Budi Darma Jalan Sisingamangaraja No. 338 Simpang Limun Medan - Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
JURIKOM (Jurnal Riset Komputer)
JURIKOM (Jurnal Riset Komputer) membahas ilmu dibidang Informatika, Sistem Informasi, Manajemen Informatika, DSS, AI, ES, Jaringan, sebagai wadah dalam menuangkan hasil penelitian baik secara konseptual maupun teknis yang berkaitan dengan Teknologi Informatika dan Komputer. Topik utama yang diterbitkan mencakup: 1. Teknik Informatika 2. Sistem Informasi 3. Sistem Pendukung Keputusan 4. Sistem Pakar 5. Kecerdasan Buatan 6. Manajemen Informasi 7. Data Mining 8. Big Data 9. Jaringan Komputer 10. Dan lain-lain (topik lainnya yang berhubungan dengan Teknologi Informati dan komputer)
Articles 5 Documents
Search results for , issue "Vol 8, No 3 (2021): Juni 2021" : 5 Documents clear
Penerapan Algoritma Tunstall Code Untuk Mengkompresi File Teks Fitri, Juli; Nasution, Surya Darma; Hutabarat, Sumiaty
JURIKOM (Jurnal Riset Komputer) Vol 8, No 3 (2021): Juni 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v8i3.2834

Abstract

Text generally contains a series of characters and can form a word, letter and narrative. For example, a text file that is large in size results in the sending process taking longer, and uses a large amount of memory space in its storage. So to save storage space and speed up the process of sending text files, it is necessary to do a compression process so that the text file size becomes smaller. One of the file compression techniques that can compress text files well is file compression using the Tunstall code algorithm. The Tunstall code algorithm work system is to determine the sequence of symbols for each codeword, take the highest probability and iterate as many as N (number of symbols) to be compressed. By using the Tunstall code algorithm, the authors managed to compress a text file quite well, namely compressing the text file size from 80 bits to 40 bits with a compression ratio of 50% reduction in size.
Game Edukasi Mengenal Mata Uang Indonesia “Rupiah” Untuk Pengetahuan Dasar Anak-Anak Berbasis Android Topan Hadi; Nana Suarna; Ade Irma Purnamasari; Odi Nurdiawan; Saeful Anwar
JURIKOM (Jurnal Riset Komputer) Vol 8, No 3 (2021): Juni 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v8i3.3609

Abstract

In the current digital era, technology and science are growing rapidly to penetrate various aspects of life, including in the field of education. By utilizing the provision of applications that contain elements of education, it gives birth to new ways in one's learning process, so that the learning process is more interesting and efficient. However, there is no learning about Indonesian currency, making the children reluctant to learn. They only know about the nominal currency, without knowing in detail the elements that exist in Indonesian currency. From these problems, a conclusion was drawn to get a solution by making an educational game in the form of introducing Indonesian paper currency on Android as a learning medium for children SDN 3 Kasdul Depok Sidapurna Cirebon). Making educational games on Android can be easily, effectively. The development of this game uses the ADDIE (Analysis, Design, Development, Implementation, Evaluation) method. The research was conducted using a quantitative concept, where the data were taken based on a questionnaire and processed by statistical figures. The results of this study showed that the interest (0.046) & motivation (0.001) variable was said to be < 0.05 so that it affected the currency recognition game
Analisa Keamanan Tanda Tangan Digital Dengan Menerapkan Metode AHA-1 Janisah Janisah; Lince Tomoria Sianturi; Candra Frenki Sianturi; Murdani Murdani
JURIKOM (Jurnal Riset Komputer) Vol 8, No 3 (2021): Juni 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v8i3.2833

Abstract

The importance of information value causes often the information desired by certain people can then modify it. To be able to validate the information obtained, authentication must be done so that the authenticity of the information is known. Signature is a marker or identity in a document. Signatures have an important role in verifying and legalizing documents. To secure digital signatures, a hash function can be processed, a hash consisting of a Secure Hash Algorithm. The Secure Hash Algorithm (SHA-1) method is a hash function that works in one direction, this means that messages that have been converted into message digest cannot be returned to the original message. Two different messages will always produce different hash values, and results from different string length input will result in an autput with a fixed string length of 160 bits.
Rancang Bangun Aplikasi Inventory Barang Pada Tempat Food and Drink Berbasis Android Mohammad Taufan Asri Zaen; Yuliadi Yuliadi; Nora Dery Sofya; Hammid Muammar Robbani Al Faruq
JURIKOM (Jurnal Riset Komputer) Vol 8, No 3 (2021): Juni 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v8i3.3560

Abstract

TEMPAT FOOD AND DRINK is a micro, small and medium enterprise in the culinary field which has two outlets in Sumbawa. TEMPAT FOOD AND DRINK selling cold drinks and foods. Recording was done manually, by the Production Manager notes on a mobile phone or a piece of paper or by keeping a purchase note. In one day there can be 4 to 5 transactions in and out of goods with various types and the number of goods reached tens of pieces from the warehouse or shop carried out by the Production Manager. This research aims to make it easier for Production Managers to calculate the number of available items in a warehouse or store, make it easier to be able to reorder with an android-based inventory. Waterfall is a system development method used in this research. The Unified Model Language (UML) used for system design is use case diagrams, activity diagrams, sequence diagrams, and class diagrams and the programming language used is Java. The result of this research is an android-based inventory application for TEMPAT FOOD AND DRINK that could find out the number of available items. Application tested with whitebox testing shows success on each independent path of the existed flowgraph
Analisa Algoritma Noekeon Untuk Mengamankan File Video Milawati Milawati; Natalia Silalahi; Kennedi Tampubolon
JURIKOM (Jurnal Riset Komputer) Vol 8, No 3 (2021): Juni 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v8i3.2840

Abstract

Along with the times, human needs are increasing, including the need for information. Therefore, sending and storing files via electronic media requires a process that is able to guarantee the safety and integrity of the file. To ensure the safety and integrity of a file, it requires a file. The encryption process is carried out when the file is sent. This process will change the original file into a secret file that cannot be read. Meanwhile, the decryption process is carried out by the recipient of the sent file. The secret file received will be changed back to the original file. By means of this encryption, the original file will not be read by unauthorized parties, but only by the recipient who has decryption key. Currently, one of the methods used to secure files is to use a cryptographic system by encoding the contents of the information (plaintext) into incomprehensible content through an encryption process (enchiper), and to retrieve the original information, a encryption process is carried out ( dechiper). accompanied by using the correct key. However, in line with the development of encryption or cryptography, efforts to obtain this key can be done by anyone, including those who are not authorized to choose the information. Therefore, research on cryptography will always evolved to obtain ever stronger cryptographic algorithms, making attempts to illegally decode cryptography illegally become more difficult

Page 1 of 1 | Total Record : 5


Filter by Year

2021 2021


Filter By Issues
All Issue Vol. 12 No. 5 (2025): Oktober 2025 Vol. 12 No. 4 (2025): Agustus 2025 Vol 12, No 3 (2025): Juni 2025 Vol. 12 No. 3 (2025): Juni 2025 Vol 12, No 2 (2025): April 2025 Vol. 12 No. 2 (2025): April 2025 Vol. 12 No. 1 (2025): Februari 2025 Vol 12, No 1 (2025): Februari 2025 Vol 11, No 6 (2024): Desember 2024 Vol. 11 No. 6 (2024): Desember 2024 Vol. 11 No. 5 (2024): Oktober 2024 Vol 11, No 5 (2024): Oktober 2024 Vol 11, No 4 (2024): Augustus 2024 Vol. 11 No. 4 (2024): Augustus 2024 Vol 11, No 3 (2024): Juni 2024 Vol. 11 No. 3 (2024): Juni 2024 Vol 11, No 2 (2024): April 2024 Vol. 11 No. 2 (2024): April 2024 Vol 10, No 3 (2023): Juni 2023 Vol 10, No 2 (2023): April 2023 Vol 10, No 1 (2023): Februari 2023 Vol 9, No 6 (2022): Desember 2022 Vol 9, No 5 (2022): Oktober 2022 Vol 9, No 4 (2022): Agustus 2022 Vol 9, No 3 (2022): Juni 2022 Vol 9, No 2 (2022): April 2022 Vol 9, No 1 (2022): Februari 2022 Vol 8, No 6 (2021): Desember 2021 Vol 8, No 5 (2021): Oktober 2021 Vol 8, No 4 (2021): Agustus 2021 Vol 8, No 3 (2021): Juni 2021 Vol 8, No 2 (2021): April 2021 Vol 8, No 1 (2021): Februari 2021 Vol 7, No 6 (2020): Desember 2020 Vol. 7 No. 5 (2020): Oktober 2020 Vol 7, No 5 (2020): Oktober 2020 Vol 7, No 4 (2020): Agustus 2020 Vol 7, No 3 (2020): Juni 2020 Vol 7, No 2 (2020): April 2020 Vol 7, No 1 (2020): Februari 2020 Vol 6, No 6 (2019): Desember 2019 Vol 6, No 5 (2019): Oktober 2019 Vol 6, No 4 (2019): Agustus 2019 Vol 6, No 3 (2019): Juni 2019 Vol 6, No 2 (2019): April 2019 Vol 6, No 1 (2019): Februari 2019 Vol 5, No 6 (2018): Desember 2018 Vol 5, No 5 (2018): Oktober 2018 Vol 5, No 4 (2018): Agustus 2018 Vol 5, No 3 (2018): Juni 2018 Vol 5, No 2 (2018): April 2018 Vol 5, No 1 (2018): Februari 2018 Vol 4, No 5 (2017): Oktober 2017 Vol 4, No 4 (2017): Agustus 2017 Vol 3, No 6 (2016): Desember 2016 Vol 3, No 5 (2016): Oktober 2016 Vol 3, No 4 (2016): Agustus 2016 Vol 3, No 1 (2016): Februari 2016 Vol 2, No 6 (2015): Desember 2015 More Issue