cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
jurikom.stmikbd@gmail.com
Editorial Address
STMIK Budi Darma Jalan Sisingamangaraja No. 338 Simpang Limun Medan - Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
JURIKOM (Jurnal Riset Komputer)
JURIKOM (Jurnal Riset Komputer) membahas ilmu dibidang Informatika, Sistem Informasi, Manajemen Informatika, DSS, AI, ES, Jaringan, sebagai wadah dalam menuangkan hasil penelitian baik secara konseptual maupun teknis yang berkaitan dengan Teknologi Informatika dan Komputer. Topik utama yang diterbitkan mencakup: 1. Teknik Informatika 2. Sistem Informasi 3. Sistem Pendukung Keputusan 4. Sistem Pakar 5. Kecerdasan Buatan 6. Manajemen Informasi 7. Data Mining 8. Big Data 9. Jaringan Komputer 10. Dan lain-lain (topik lainnya yang berhubungan dengan Teknologi Informati dan komputer)
Articles 1,069 Documents
Perancangan Aplikasi Enkripsi Pada File Teks Menggunakan Algoritma Spritz Syariah Kabeaken; Imam Saputra
JURIKOM (Jurnal Riset Komputer) Vol 7, No 3 (2020): Juni 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (236.979 KB) | DOI: 10.30865/jurikom.v7i3.2125

Abstract

The security of a file is a matter of concern in maintaining the confidentiality of information, especially those containing information that only the authorized parties may know about. Sending files or information without security will risk tapping and the information contained therein, can be easily known by unauthorized parties. One important thing in maintaining the confidentiality and security of files is the encryption process. Then based on techniques in cryptography, one of the methods that will be used in securing text files with the Spritz algorithm. Modern cryptography is more trusted by scientists than classical cryptography because it has a good level of security. Classical cryptography only does randomization from A-Z while modern cryptography operates in bit mode. The modern algorithm used is the Spritz algorithm. The Spritz algorithm is a variant of the RC4 algorithm, the security level of the Spritz algorithm is better than RC4
Implementasi Algoritma Raita Pada Aplikasi Hukum Kanonik Berbasis Mobile Efidoren L Nainggolan; Muhammad Syahrizal; Saidi Ramadan Siregar
JURIKOM (Jurnal Riset Komputer) Vol 7, No 3 (2020): Juni 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (270.155 KB) | DOI: 10.30865/jurikom.v7i3.2262

Abstract

Canonical law is an internal church law governing the Catholic Church, Eastern Orthodox Church, Eastern Orthodox Church, Anglican Communion. How the laws of the church are governed, interpreted and sometimes examined differ fundamentally between the three church bodies. in all three traditions, a canon was originally a rule accepted by an assembly, these canons formed the basis for canon law. Raita algorithm is part of the exact string matching algorithm, which is matching the string exactly with the arrangement of characters in the matched string that has the same number or sequence of characters in the string. Matching strings on the raita algorithm is done through a shift from the right of the character then to the left of the character and to the middle of the character. The problem in this research is the content of canon law in general consists of a very large number of pages of books, this makes it difficult for canonical law users to find the contents needed, then in the search it takes time to find the contents of canonical law that are searched for too many search problems. that is, too much time must be needed to find the contents of the canonical law sought
Simulasi Sistem Monitoring Link Metro Ethernet (ME) di PT Indosat Ooredoo Medan dengan Metode Doppler Mhd Ramadhan Nainggolan; Pristiwanto Pristiwanto
JURIKOM (Jurnal Riset Komputer) Vol 7, No 3 (2020): Juni 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (236.241 KB) | DOI: 10.30865/jurikom.v7i3.2169

Abstract

Current technological developments have been so rapid, monitoring computer networks has become a very necessary thing. Computer network connection is a fundamental thing in a computer network that cannot be used. Likewise for the Metro Ethenet network work, If a parameter is problematic then the quality of the network will be reduced and Frequently occurs the duration of Metro ethernet monitoring and access to the report report ME becomes disrupted. This Final Project I will discuss how the Metro Ethernet Link Monitoring Simulation System in PT Indosat Ooredoo with the doppler method to determine the status of the Link on Metro Ethernet uses tree topology because it only simulates 3 Metro Ethernet and also discusses Metro Ethernet performance, which analyzes simulation applications, and Metro Ethernet Link status. Metro Ethernet is one of the technological solutions for High End Market (HEM) in providing integrated solutions for voice, data and video services. Metro Ethernet network has characteristics. Based on the above problems, a system for Metro Ethernet Link monitoring simulation is needed at Indosat Ooredoo to get better results than the previous system.
Implementasi Algoritma Mars Pada Pengamanan SMS Nurainun Hasanah Sinaga; Muhammad Syahrizal
JURIKOM (Jurnal Riset Komputer) Vol 7, No 3 (2020): Juni 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (205.095 KB) | DOI: 10.30865/jurikom.v7i3.2175

Abstract

SMS (Short Message Service) is a popular communication technology revolution. The development of computerized technology has been very advanced. SMS is very vulnerable to data theft or theft by irresponsible parties. For the sake of maintaining the security of SMS can be done by using cryptographic techniques. Cryptographic techniques can encode text messages by encrypting them into passwords that are not understood. Mars algorithm is an algorithm that uses a 128-bit key and the encryption process consists of 32 rounds. This symmetry algorithm will produce a higher level of security for the ultrasound image because it can encode it into a form of cipher with a process that is complex enough so that it will be difficult for cryptanalysts to access the image. This research will use the Mars algorithm for the encryption and decryption process, so the process needs to go through several long stages in order to produce the final cipher. This study describes the process of securing SMS by encoding it based on the Mars algorithm, in the form of a password that is difficult for others to understand and understand. This is done as an effort to minimize acts of misuse of SMS
Perancangan Aplikasi Penyandian Pesan Chat Client dan Server Berdasarkan Algoritma Spritz Widodo Arif Prabowo; Mesran Mesran; Siti Nurhabibah Hutagalung
JURIKOM (Jurnal Riset Komputer) Vol 7, No 3 (2020): Juni 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (184.88 KB) | DOI: 10.30865/jurikom.v7i3.2126

Abstract

The development of the computer world in the current era, the need to secure messages / data and for security in communication is very important. The author conducted this research aims to secure chat messages from client to server and vice versa. With this cryptographic technique used to convert chat messages into the form of certain codes with the intention that chat messages cannot be seen / read by anyone except people who have the right to read the chat messages. In this study, the Client and Server Message Chat encoding application is designed which implements the workings of encryption and decryption using the Spritz Algorithm. The results of this study are chat client and server message encoding applications with the Spritz algorithm that can encode confidential chat messages. This application was created using Microsoft Visual Basic 2008
Perancangan Aplikasi Penyandian Pesan Chat Client dan Server Berdasarkan Algoritma Spritz Prabowo, Widodo Arif; Mesran, Mesran; Hutagalung, Siti Nurhabibah
JURIKOM (Jurnal Riset Komputer) Vol 7, No 3 (2020): Juni 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (184.88 KB) | DOI: 10.30865/jurikom.v7i3.2126

Abstract

The development of the computer world in the current era, the need to secure messages / data and for security in communication is very important. The author conducted this research aims to secure chat messages from client to server and vice versa. With this cryptographic technique used to convert chat messages into the form of certain codes with the intention that chat messages cannot be seen / read by anyone except people who have the right to read the chat messages. In this study, the Client and Server Message Chat encoding application is designed which implements the workings of encryption and decryption using the Spritz Algorithm. The results of this study are chat client and server message encoding applications with the Spritz algorithm that can encode confidential chat messages. This application was created using Microsoft Visual Basic 2008
Implementasi Website Penilaian Kinerja Paramedis pada Rumah Sakit Nicodias Palasara; Diah Ayu Anggraeni; M Qomaruddin
JURIKOM (Jurnal Riset Komputer) Vol 7, No 3 (2020): Juni 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (542.15 KB) | DOI: 10.30865/jurikom.v7i3.2168

Abstract

Performance appraisal that still uses manual calculations and paper media, will use a lot of paper and archiving stacked files and often there are errors or unclear writing so that they do not get the right assessment results on target. As one of the means of public health service providers are required to improve the quality and professionalism in terms of health services, one of which is in the scope of health workers such as paramedics. Overcoming this, a significant increase in the number of paramedics in hospitals must be in line with good management by human resources officers, in order to improve the quality of health services. Then the implementation of the paramedic performance appraisal website at the hospital is one good solution to make it easier to overcome the problem. In this study created a website to support the paramedic performance evaluation. In making a website using the waterfall method, whose function can accelerate the results and quality of the website. Computerized performance appraisal systems run better and more efficiently than manual systems and can minimize paper usage and data accuracy
Implementasi Website Penilaian Kinerja Paramedis pada Rumah Sakit Palasara, Nicodias; Anggraeni, Diah Ayu; Qomaruddin, M
JURIKOM (Jurnal Riset Komputer) Vol 7, No 3 (2020): Juni 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (542.15 KB) | DOI: 10.30865/jurikom.v7i3.2168

Abstract

Performance appraisal that still uses manual calculations and paper media, will use a lot of paper and archiving stacked files and often there are errors or unclear writing so that they do not get the right assessment results on target. As one of the means of public health service providers are required to improve the quality and professionalism in terms of health services, one of which is in the scope of health workers such as paramedics. Overcoming this, a significant increase in the number of paramedics in hospitals must be in line with good management by human resources officers, in order to improve the quality of health services. Then the implementation of the paramedic performance appraisal website at the hospital is one good solution to make it easier to overcome the problem. In this study created a website to support the paramedic performance evaluation. In making a website using the waterfall method, whose function can accelerate the results and quality of the website. Computerized performance appraisal systems run better and more efficiently than manual systems and can minimize paper usage and data accuracy
Implementasi Cloud Computing Technology dan Dampaknya Terhadap Kelangsungan Bisnis Perusahaan Dengan Menggunakan Metode Agile dan Studi Literatur Eri Riana
JURIKOM (Jurnal Riset Komputer) Vol 7, No 3 (2020): Juni 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (530.774 KB) | DOI: 10.30865/jurikom.v7i3.2192

Abstract

Cloud Computing technology is a new paradigm in the delivery of computing services, Cloud Computing has many advantages compared to conventional systems usually. The development of business at this time began to compete globally to be able to satisfy customers, so companies need access to information that is fast and accurate. In order to access information quickly, companies need to build Information and Communication Technology infrastructure that requires large capital, on the other hand cloud computing is present as an alternative solution. Services provided by cloud computing include hardware, infrastructure, platforms and applications. Cloud computing is very useful, because it can reduce computing costs, increase reliability and provide considerable opportunities for the industrial world. One company that provides cloud computing services is Google. The features of cloud computing are believed to be far more efficient and satisfying. The problem that arises is how companies implement Cloud Computing using Google Cloud and how to carry out the process of deployment and provisioning of Google Cloud SQL Database. The purpose of this research is to provide a study of the benefits of implementing Google Cloud for companies to improve business competitiveness so tightly. This research uses Agile method and literature study, which begins with planning, implementation, testing, documentation, deployment, maintenance, problem identification and analysis and discussion related to Google Cloud, where the results of this research are that Google Cloud can create a model business is more flexible, and faster. The purpose of writing this journal is to provide an overview of the understanding of cloud computing and its development as well as the advantages and disadvantages of companies that use Cloud Computing technology. Based on these searches it is known that Cloud Computing as a technology that utilizes internet services uses a virtual central server for the purpose of maintaining data and applications. The existence of Cloud Computing itself has caused changes in the workings of information technology systems in a company. Security and data storage systems are important for companies. Cloud Computing technology has provided huge benefits for most companies. To carry out the process, the device needs to be prepared include hardware such as HPE DL 20 Gen 10 E-2136-4 SFF Server Computer, 2x1 TB SATA 7.2K 3.5 "Hard Drive, 256GB RAM, minimum bandwidth of 5 Mbps and software requirements including Windows Server 2012 R2 Enterprise, VMM, Google Cloud Platform Enterprise, SQL Server 2012
IMPLEMENTASI CLOUD COMPUTING TECHNOLOGY DAN DAMPAKNYA TERHADAP KELANGSUNGAN BISNIS PERUSAHAAN DENGAN MENGGUNAKAN METODE AGILE DAN STUDI LITERATUR Riana, Eri
JURIKOM (Jurnal Riset Komputer) Vol 7, No 3 (2020): Juni 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (530.774 KB) | DOI: 10.30865/jurikom.v7i3.2192

Abstract

Cloud Computing technology is a new paradigm in the delivery of computing services, Cloud Computing has many advantages compared to conventional systems usually. The development of business at this time began to compete globally to be able to satisfy customers, so companies need access to information that is fast and accurate. In order to access information quickly, companies need to build Information and Communication Technology infrastructure that requires large capital, on the other hand cloud computing is present as an alternative solution. Services provided by cloud computing include hardware, infrastructure, platforms and applications. Cloud computing is very useful, because it can reduce computing costs, increase reliability and provide considerable opportunities for the industrial world. One company that provides cloud computing services is Google. The features of cloud computing are believed to be far more efficient and satisfying. The problem that arises is how companies implement Cloud Computing using Google Cloud and how to carry out the process of deployment and provisioning of Google Cloud SQL Database. The purpose of this research is to provide a study of the benefits of implementing Google Cloud for companies to improve business competitiveness so tightly. This research uses Agile method and literature study, which begins with planning, implementation, testing, documentation, deployment, maintenance, problem identification and analysis and discussion related to Google Cloud, where the results of this research are that Google Cloud can create a model business is more flexible, and faster. The purpose of writing this journal is to provide an overview of the understanding of cloud computing and its development as well as the advantages and disadvantages of companies that use Cloud Computing technology. Based on these searches it is known that Cloud Computing as a technology that utilizes internet services uses a virtual central server for the purpose of maintaining data and applications. The existence of Cloud Computing itself has caused changes in the workings of information technology systems in a company. Security and data storage systems are important for companies. Cloud Computing technology has provided huge benefits for most companies. To carry out the process, the device needs to be prepared include hardware such as HPE DL 20 Gen 10 E-2136-4 SFF Server Computer, 2x1 TB SATA 7.2K 3.5 "Hard Drive, 256GB RAM, minimum bandwidth of 5 Mbps and software requirements including Windows Server 2012 R2 Enterprise, VMM, Google Cloud Platform Enterprise, SQL Server 2012

Page 30 of 107 | Total Record : 1069


Filter by Year

2015 2026


Filter By Issues
All Issue Vol. 13 No. 1 (2026): Februari 2026 Vol. 12 No. 6 (2025): Desember 2025 Vol. 12 No. 5 (2025): Oktober 2025 Vol. 12 No. 4 (2025): Agustus 2025 Vol 12, No 3 (2025): Juni 2025 Vol. 12 No. 3 (2025): Juni 2025 Vol 12, No 2 (2025): April 2025 Vol. 12 No. 2 (2025): April 2025 Vol. 12 No. 1 (2025): Februari 2025 Vol 12, No 1 (2025): Februari 2025 Vol 11, No 6 (2024): Desember 2024 Vol. 11 No. 6 (2024): Desember 2024 Vol 11, No 5 (2024): Oktober 2024 Vol. 11 No. 5 (2024): Oktober 2024 Vol 11, No 4 (2024): Augustus 2024 Vol. 11 No. 4 (2024): Augustus 2024 Vol 11, No 3 (2024): Juni 2024 Vol. 11 No. 3 (2024): Juni 2024 Vol. 11 No. 2 (2024): April 2024 Vol 11, No 2 (2024): April 2024 Vol 10, No 3 (2023): Juni 2023 Vol 10, No 2 (2023): April 2023 Vol 10, No 1 (2023): Februari 2023 Vol 9, No 6 (2022): Desember 2022 Vol 9, No 5 (2022): Oktober 2022 Vol 9, No 4 (2022): Agustus 2022 Vol 9, No 3 (2022): Juni 2022 Vol 9, No 2 (2022): April 2022 Vol 9, No 1 (2022): Februari 2022 Vol 8, No 6 (2021): Desember 2021 Vol 8, No 5 (2021): Oktober 2021 Vol 8, No 4 (2021): Agustus 2021 Vol 8, No 3 (2021): Juni 2021 Vol 8, No 2 (2021): April 2021 Vol 8, No 1 (2021): Februari 2021 Vol 7, No 6 (2020): Desember 2020 Vol. 7 No. 5 (2020): Oktober 2020 Vol 7, No 5 (2020): Oktober 2020 Vol 7, No 4 (2020): Agustus 2020 Vol 7, No 3 (2020): Juni 2020 Vol 7, No 2 (2020): April 2020 Vol 7, No 1 (2020): Februari 2020 Vol 6, No 6 (2019): Desember 2019 Vol 6, No 5 (2019): Oktober 2019 Vol 6, No 4 (2019): Agustus 2019 Vol 6, No 3 (2019): Juni 2019 Vol 6, No 2 (2019): April 2019 Vol 6, No 1 (2019): Februari 2019 Vol 5, No 6 (2018): Desember 2018 Vol 5, No 5 (2018): Oktober 2018 Vol 5, No 4 (2018): Agustus 2018 Vol 5, No 3 (2018): Juni 2018 Vol 5, No 2 (2018): April 2018 Vol 5, No 1 (2018): Februari 2018 Vol 4, No 5 (2017): Oktober 2017 Vol 4, No 4 (2017): Agustus 2017 Vol 3, No 6 (2016): Desember 2016 Vol 3, No 5 (2016): Oktober 2016 Vol 3, No 4 (2016): Agustus 2016 Vol 3, No 1 (2016): Februari 2016 Vol 2, No 6 (2015): Desember 2015 More Issue