cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
jurikom.stmikbd@gmail.com
Editorial Address
STMIK Budi Darma Jalan Sisingamangaraja No. 338 Simpang Limun Medan - Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
JURIKOM (Jurnal Riset Komputer)
JURIKOM (Jurnal Riset Komputer) membahas ilmu dibidang Informatika, Sistem Informasi, Manajemen Informatika, DSS, AI, ES, Jaringan, sebagai wadah dalam menuangkan hasil penelitian baik secara konseptual maupun teknis yang berkaitan dengan Teknologi Informatika dan Komputer. Topik utama yang diterbitkan mencakup: 1. Teknik Informatika 2. Sistem Informasi 3. Sistem Pendukung Keputusan 4. Sistem Pakar 5. Kecerdasan Buatan 6. Manajemen Informasi 7. Data Mining 8. Big Data 9. Jaringan Komputer 10. Dan lain-lain (topik lainnya yang berhubungan dengan Teknologi Informati dan komputer)
Articles 1,069 Documents
Sistem Pendukung Keputusan Untuk Menentukan Kelayakan Bus Berdasarkan Uji Kir Menggunakan Metode Promethee II (Studi Kasus: Dinas Perhubungan Provinsi Sumatera Utara) Supirman Supirman; Murdani Murdani
JURIKOM (Jurnal Riset Komputer) Vol 7, No 2 (2020): April 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (372.094 KB) | DOI: 10.30865/jurikom.v7i2.2123

Abstract

One of the requirements for a bus / public transportation to be able to operate is passing the test carried out by the Transportation Department. The results of the transportation feasibility test still use manual calculations, while many transports do the daily test. Therefore a decision support system is needed to determine the feasibility of the bus based on the kir test. This study aims to determine the feasibility of the bus based on the left test. A decent bus will get a roadworthiness certificate issued by the Transportation Agency. In testing, good planning management is needed, one of which is by determining the feasibility. This decision support system can determine the calculated value of all criteria. This system uses the Promethee II method. In this case the Promethee II method can determine the priority of the bus driver test based on the highest value. Thus this system is able to shorten the bus verification process at the North Sumatra Provincial Transportation Office, thus helping testers determine which buses are worthy of road
IMPLEMENTASI METODE HUNGARIAN DALAM PENUGASAN KARYAWAN PADA PT. RIA SUKSES MANDIRI MEDAN Zandroto, Tetty Natalia
JURIKOM (Jurnal Riset Komputer) Vol 6, No 2 (2019): April 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (111.569 KB) | DOI: 10.30865/jurikom.v6i2.1319

Abstract

Assignment of employees in an office is a complicated matter and often has difficulty in the division of tasks which causes instability in the performance of employees. Employee assignment simulation in writing this essay was made to help the company. Applications using POM QM For Windows make the process of assigning employees very easy to get results as efficiently as possible. This resulted in the need for optimal assignment arrangements for the company. This employee assignment problem is solved by creating an employee assignment optimization model by maximizing the efficiency level of the use of POM QM For Windows software to minimize the level of employee dissatisfaction with the applicable tasks. The purpose of this study is to find the maximum value of employee assignments that will be applied by PT Ria Sukses Mandiri Medan. In searching for the maximized value the method used is the Hungarian algorithm. After doing the results of calculations using the Hungarian method, the company should implement this method in order to be able to place the employees to be worked on.
Penerapan Fuzzy String Matching Pada Aplikasi Pencarian Judul Skripsi Teknik Informatika Berbasis Android Khairunnisa Khairunnisa
JURIKOM (Jurnal Riset Komputer) Vol 6, No 3 (2019): Juni 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (150.779 KB) | DOI: 10.30865/jurikom.v6i3.1339

Abstract

The library is the center of the gathering of various information and knowledge both in the form of books and other recording materials to meet the needs of the learning process. In addition to storing books, the library also stores final assignment documents or thesis of students who have graduated from the college. This description can usually be used as a reference material for students in preparing the final assignment. The more years the number of thesis increases so that it requires a storage space the wider. The problem that is often faced by students is that the thesis search process needed as reference material takes a long time. From these problems it is necessary to make innovations by utilizing information technology. Mobile phones are not only used to call and send messages, but cellphones also have various other functions such as internet access, audio and video player media, and so on. Android is one of the operating systems for mobile phones among the development of other mobile operating systems such as Windows Mobile, Symbian, Blackberry OS and others. In this study, we will build a repository application for an Android-based thesis search that is built by applying the Fuzzy String Matching algorithm. Fuzzy String Matching Algorithm is one of the string search methods that uses the approach process to the pattern of the string being searched for. Search for the same string and also the string that approaches the other strings collected in a container or dictionary. By utilizing the Fuzzy String Matching algorithm in the thesis search application on informatics engineering, it is expected to be able to search quickly and efficiently.
Penerapan Metode Hungarian Dalam Optimasi Biaya Marketing Pada Pt. Jovi Karunia Jaya Nofranti Samosir
JURIKOM (Jurnal Riset Komputer) Vol 6, No 4 (2019): Agustus 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (175.414 KB) | DOI: 10.30865/jurikom.v6i4.1401

Abstract

Marketing is a person who works in marketing, able to serve, market, able to interact directly with consumers. In the business world more and more rivals are able to drop or create a bankrupt company, if it has a high expenditure while the income is small. Companies that go bankrupt because of the cost to employees are too large like in completing the work when doing product offer marketing letters. Each employee has an assignment fee for different jobs, because the nature or manner of each job is different. Every employee has different skill level, work experience, different educational background, so it requires different cost, so the cost to each employee must be minimized.
PENGAMANAN PESAN TEKS E-MAIL MENGGUNAKAN METODE ALGORITMA BIFID DAN FEEDBACK CIPHER Wulandari, Siska
JURIKOM (Jurnal Riset Komputer) Vol 6, No 5 (2019): Oktober 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (279.83 KB) | DOI: 10.30865/jurikom.v6i5.1646

Abstract

One of the most widely used internet applications is electronic message sending, called e-mail. As time goes by, sending messages via e-mail becomes one of the important things. But there are some threats that do not know when using e-mails such as eavesdropping on e-mail contents, changing e-mail contents by unauthorized people and making e-mails no longer authentic. The technique of securing text messages or data is known as cryptography. In cryptography there are several methods that are quite important in securing data, to maintain data confidentiality one of which is encryption (coding). Decryption (original text) of one of the cryptographic algorithms, namely bifid cipher and feedbak cipher. Bifid cipher was first discovered by Felix Delastelle in 1901. Bifid cioher encrypts by randomizing the position of the row and column of letters in the message that corresponds to the 5X5 square key board while the Cipher Feedback Method uses the Shift Register system, which is processed first is the Initialization Vector in the Encryption with Key algorithm. After processing, the resulting bits will go through a bit selection process, usually the leftmost bits, then encrypted with Plaintext to produce the Ciphertext. By applying a combination of the two algorithms, the bifid cipher algorithm and the feedback cipher, it is expected that the message sent in the e-mail will be coded so that unauthorized parties do not know the meaning of the message being sent. And can maintain the authenticity of the messages sent
PERANCANGAN APLIKASI PENGENALAN ALAT-ALAT LITURGI MENGGUNAKAN AUGMENTED REALITY BERBASIS MOBILE Pertiwi, Rahayu Putri; Nurhayati, Oki Dwi; Isnanto, Rizal
JURIKOM (Jurnal Riset Komputer) Vol 6, No 6 (2019): Desember 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (335.881 KB) | DOI: 10.30865/jurikom.v6i6.1738

Abstract

Catholicism, is one of the recognized religions in Indonesia. Today many Catholics do not know about their own means of worship. Therefore it is necessary to conduct a study to create an Android application with Augmented Reality technology as an alternative introduction to liturgical devices. The development of this application uses the Multimedia Development Life Cycle. This application will display 3D object visualization of liturgical instruments along with a Description Panel and buttons for sounding, and allows users to zoom in, zoom out and move objects. The application is built using Blender3D, Unity3D, and Vuforia SDK.  Results of application testing are the function keys on the application 100% successful. The ideal detection results are obtained in a room with a light intensity of at least 38 lux and a maximum of 180 lux, a distance of 15-30 cm, and an angle of 60o-90o. Testing the detection of barrier markers, the ideal result of 100% success is shown if the marker is not blocked by anything.
Estimasi Biaya Software FAS (Financing Analysis System) Menggunakan Metode Function Point (Studi Kasus Pada PT BPRS Lantabur Tebuireng) Juliana Kristi; Siti Nur Aisah; Renny Sari Dewi
JURIKOM (Jurnal Riset Komputer) Vol 7, No 1 (2020): Februari 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (338.335 KB) | DOI: 10.30865/jurikom.v7i1.1891

Abstract

Software cost estimation is the process of predicting software development efforts. The basic input of software cost estimation is the measurement metric. Projects often experience delays, over-budget, and are not completed due to failure to estimate software development costs. PT BPRS (Bank Perkreditan Rakyat Syariah) Lanatabur Tebuireng determines the estimated cost based on the amount of human resources, features needed, and funds owned. This study explains the estimated costs of the FAS (Financing Analysis System) software at PT BPRS Lantabur Tebuireng using the Function Point method. Function Point is a method of measuring software functionality based on the type of user function that is External Input, External Output, External Inquire, Internal Logic File, and External Interface File as well as technical calculations of software development. The final of the FAS (Financing Analysis System) study cost around IDR 94,797,120.
IMPLEMENTASI REDUKSI NOISE PADA CITRA ULTRASONOGRAFI (USG) MENGGUNAKAN METODE MEDIAN FILTER Wati, Fadila
JURIKOM (Jurnal Riset Komputer) Vol 5, No 6 (2018): Desember 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (202.737 KB) | DOI: 10.30865/jurikom.v5i6.1208

Abstract

A data or information is presented not only in the form of text data but also can be in the form of audio, video, and images. In this day and age information is very important and necessary, as is the information contained in the image. Image (image) or other terms for images is one of the multimedia components that play an important role as a form of visual information. Compared to text data, images have a lot of information. In digital formatted images damage often occurs which is defined as noise. But sometimes images can also experience a decrease, namely degradation or deterioration in quality caused by noise / noise, too contrasting colors, blurring, and others. There are several types of noise in image processing, one of which is Salt & Pepper noise. The Salt & Pepper Noise is shaped like black and white spots on the image. To reduce this noise, a method is needed, one of which is the median filter. The method used in this study is the median filter.
Implementasi Access Control List Pada Mikrotik dalam Mengamankan Koneksi Internet Koperasi Sumber Dana Mutiara Bil Klinton Sihotang; Sumarno Sumarno; Bahrudi Efendi Damanik
JURIKOM (Jurnal Riset Komputer) Vol 7, No 2 (2020): April 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (331.472 KB) | DOI: 10.30865/jurikom.v7i2.2010

Abstract

The need for information and internet access at this time is very high. To accept it is wrong only with computer networks as a medium. In a network that requires a network that has been segmented using a Virtual Local Area Network (VLAN), the application of an Access Control List (ACL) is required to be granted access rights for each device in the network. The Access Control List (ACL) can filter the data traffic of a network by controlling whether the packets are passed or issued. A network is built using several different network devices, one of which is a router. A router is a tool that can process different data packet networks (between networks) through a process called routing. lots of companies that produce routers, mikrotik is one of the companies that produce routers. mikrotik is easy to do because it uses Winbox in Gui's view, besides that the hotspot server in it is provided with several management facilities that can be arranged according to network requirements
IMPLEMENTASI ALGORITMA ELGAMAL DENGAN PEMBANGKIT BILANGAN PRIMA LEHMANN DAN ALGORITMA LEAST SIGNIFICANT BIT (LSB) DENGAN COVER IMAGE BITMAP UNTUK KEAMANAN DATA TEXT Rahmansyah, Edi
JURIKOM (Jurnal Riset Komputer) Vol 6, No 1 (2019): Februari 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (264.326 KB) | DOI: 10.30865/jurikom.v6i1.1301

Abstract

Encryption is the process of securing an information by making the information into a random form so that the information content cannot be read or understood. Algorithms used for encryption have evolved, ranging from classical algorithms to modern algorithms. But encryption still has weaknesses, one of which is the result of encryption will produce a random character which will raise suspicion that the information is important information. Cryptanalysis is a technique used to solve cryptography, where random data can be returned to the original data, so cryptography is not entirely safe. Because of these shortcomings, data security techniques are also developed by inserting information into media such as images or videos so that the information is not visible, the technique is called steganography. Steganalysis is a technique used to find out whether an image has information that is inserted, so that with this technique steganography is not fully safe.

Page 27 of 107 | Total Record : 1069


Filter by Year

2015 2026


Filter By Issues
All Issue Vol. 13 No. 1 (2026): Februari 2026 Vol. 12 No. 6 (2025): Desember 2025 Vol. 12 No. 5 (2025): Oktober 2025 Vol. 12 No. 4 (2025): Agustus 2025 Vol 12, No 3 (2025): Juni 2025 Vol. 12 No. 3 (2025): Juni 2025 Vol 12, No 2 (2025): April 2025 Vol. 12 No. 2 (2025): April 2025 Vol 12, No 1 (2025): Februari 2025 Vol. 12 No. 1 (2025): Februari 2025 Vol 11, No 6 (2024): Desember 2024 Vol. 11 No. 6 (2024): Desember 2024 Vol. 11 No. 5 (2024): Oktober 2024 Vol 11, No 5 (2024): Oktober 2024 Vol 11, No 4 (2024): Augustus 2024 Vol. 11 No. 4 (2024): Augustus 2024 Vol. 11 No. 3 (2024): Juni 2024 Vol 11, No 3 (2024): Juni 2024 Vol 11, No 2 (2024): April 2024 Vol. 11 No. 2 (2024): April 2024 Vol 10, No 3 (2023): Juni 2023 Vol 10, No 2 (2023): April 2023 Vol 10, No 1 (2023): Februari 2023 Vol 9, No 6 (2022): Desember 2022 Vol 9, No 5 (2022): Oktober 2022 Vol 9, No 4 (2022): Agustus 2022 Vol 9, No 3 (2022): Juni 2022 Vol 9, No 2 (2022): April 2022 Vol 9, No 1 (2022): Februari 2022 Vol 8, No 6 (2021): Desember 2021 Vol 8, No 5 (2021): Oktober 2021 Vol 8, No 4 (2021): Agustus 2021 Vol 8, No 3 (2021): Juni 2021 Vol 8, No 2 (2021): April 2021 Vol 8, No 1 (2021): Februari 2021 Vol 7, No 6 (2020): Desember 2020 Vol. 7 No. 5 (2020): Oktober 2020 Vol 7, No 5 (2020): Oktober 2020 Vol 7, No 4 (2020): Agustus 2020 Vol 7, No 3 (2020): Juni 2020 Vol 7, No 2 (2020): April 2020 Vol 7, No 1 (2020): Februari 2020 Vol 6, No 6 (2019): Desember 2019 Vol 6, No 5 (2019): Oktober 2019 Vol 6, No 4 (2019): Agustus 2019 Vol 6, No 3 (2019): Juni 2019 Vol 6, No 2 (2019): April 2019 Vol 6, No 1 (2019): Februari 2019 Vol 5, No 6 (2018): Desember 2018 Vol 5, No 5 (2018): Oktober 2018 Vol 5, No 4 (2018): Agustus 2018 Vol 5, No 3 (2018): Juni 2018 Vol 5, No 2 (2018): April 2018 Vol 5, No 1 (2018): Februari 2018 Vol 4, No 5 (2017): Oktober 2017 Vol 4, No 4 (2017): Agustus 2017 Vol 3, No 6 (2016): Desember 2016 Vol 3, No 5 (2016): Oktober 2016 Vol 3, No 4 (2016): Agustus 2016 Vol 3, No 1 (2016): Februari 2016 Vol 2, No 6 (2015): Desember 2015 More Issue