cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282370070808
Journal Mail Official
mesran.skom.mkom@gmail.com
Editorial Address
Jalan sisingamangaraja No 338 Medan, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
KLIK: Kajian Ilmiah Informatika dan Komputer
ISSN : -     EISSN : 27233898     DOI : -
Core Subject : Science,
Topik utama yang diterbitkan mencakup: 1. Teknik Informatika 2. Sistem Informasi 3. Sistem Pendukung Keputusan 4. Sistem Pakar 5. Kecerdasan Buatan 6. Manajemen Informasi 7. Data Mining 8. Big Data 9. Jaringan Komputer 10. Dan lain-lain (topik lainnya yang berhubungan dengan Teknologi Informati dan komputer)
Articles 7 Documents
Search results for , issue "Vol. 2 No. 1 (2021): Agustus 2021" : 7 Documents clear
Sistem Pendukung Keputusan Pemilihan Peserta FLS2N SMAN 1 Perbaungan Menggunakan Metode MABAC Zulkarnain Zulkarnain; Yasir Hasan
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 2 No. 1 (2021): Agustus 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Selection of students of SMAN 1 Perbaungan to find out results that are balanced with the training that has been carried out at the school. SMAN 1 The previous comparison was not good, because there were still students or students who were dissatisfied with the results and there was an unrealistic impression. Besides that, SMAN 1 Perbaungan also had difficulty processing student data because there were only 8 students selected. For this reason, students and SMAN 1 Perbaungan want a more systematic selection process with the help of computerized calculation of decision support systems. The selection process for FLS2N SMAN 1 Perbaungan participants uses the MABAC method. The adoption of a decision support system and the MABAC method can help SMAN 1 Perbaungan in selecting FLS2N participants both systematically and with more realistic ranking results
Analisa Metode SHA224 Untuk Mendeteksi Orisinalitas Citra Digital Rusman Halawa
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 2 No. 1 (2021): Agustus 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In a digital image it is very important that the name of the authenticity of the data, given the data contained in it is very important and very confidential from parties who are not obliged to want to damage and change the information contained therein so it does not match what is expected. So, it is necessary to apply data security that can protect the data so that it cannot be manipulated or damaged any information contained in the data. Cryptography is the study of mathematical techniques related to aspects of information security such as data confidentiality, data integrity of data integrity, and data authentication. But not all aspects of information security can be solved by cryptography. Cryptography can also be interpreted as a science or an art to maintain message security. Some of the problems above that need to be considered and understood so that the system applied in accordance with what is desired by all parties. In digital images, the main thing that must be observed is to maintain the authenticity of digital images and improve the quality problems of digital images that you want to manipulate. With this research can overcome all the problems that occur about manipulating data from parties who are not obliged to the data From the above research the purpose of SHA224 is to secure a form of digital images that are still original that want to be manipulated by other parties. The image can be seen or manipulated anyone who has rights or obligations in the data or has no obligation at all, but when securing data using the SHA224 method, the data resulting from manipulation and original data will be detected and the results will be seen in fact. With the SHA224 method it can maintain the security and authenticity of digital images. In testing this can be done with the SHA224 method using the MATLAB application.
Implementasi Metode Enhanced Audio Steganogafi (EAS) Untuk Penyembunyian Text Terenkripsi Algoritma Gost Selamat G M Siregar
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 2 No. 1 (2021): Agustus 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Audio files in the Mp3 format are used as cover media. To be able to insert a secret message into the container media requires a method that can modify the object into a new object with confidential information in it without any noticeable changes from the initial object. The method used in this study is the EAS (Enhanced Audio Steganography) method and to encrypt the message using the GOST algorithm. EAS (Enhanced Audio Steganography) which is a method for inserting an encrypted message first to strengthen a secret message and then inserting it into an audio file. Encryption is done on the message using the GOST algorithm. The GOST method is a block cipher algorithm developed by a Soviet national. GOST is an abbreviation of "Gosudarstvennyi Standard" or "Government Standard". This algorithm is a simple encryption algorithm that has 32 rounds of processes and uses 64 bit block cipher with 256 bit keys. The GOST method also uses 8 different S-Boxes and XOR and Left Circular Shift operations. However, modifying audio file bits sequentially can create huge noise and invite suspicion for others that there is a message embedded in it. The method that is able to reduce the occurrence of noise in audio files after inserting a message is the EAS (Enhanced Audio Steganography) method. The EAS method is a modification of the LSB method. Where in the EAS method, the bytes that are used as containers only selective bytes, that is, the insertion of bits in the storage media is only done in blocks that are 254 or 255 bytes only, so that the storage media will not experience significant damage. The first input message format *. Doc or *. Pdf, will be encrypted using the Gost algorithm, the encryption process begins with input plaintext and key. After the message is encrypted then the embedding process uses the EAS method. Input audio file that will be used as a container, after that the encrypted file will be inserted in the audio file. In the embedding process, a large number of locations are available on the audio file. Audio files that are used as storage media must have a number of bytes worth 254 or 255 which are sufficient to hold the message file.
Penerapan Metode Vikor Dalam Pengambilan Keputusan Penunjukan Kader Pemberian Obat Pencegahan Massal Filariasi Studi Kasus Dinas Kesehatan Aceh Singkil Enci Manda Sari
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 2 No. 1 (2021): Agustus 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The Cadre Officer for the Provision of Mass Prevention of Drugs is an employee recruited from the Aceh Singkil Health Office, for the community, who is tasked with assisting the smooth running of health services. Filariasis is a negleted tropical disease (NTD) which has a severe impact on the patient because it causes disability. Because filariasis causes permanent disability and causes misery to the community, prevention is carried out by administering Filariasis Mass Prevention Drugs. Provision of Mass Prevention Drugs for filariasis is carried out by giving mass drugs once a year for five consecutive years by cadre officers for Mass Preventive Drug Administration. The problem in the formation of cadre officers so far is that the Aceh Singkil Health Service is still lacking, because so far the selection of cadres for Mass Prevention Drugs is still done manually by the committee in making decisions on cadres of giving Mass Prevention Drugs for Filariasis so that it can be fatal, because those who have been elected training was carried out by the Aceh Singkil Health Office so that when conducting training many were considered inappropriate. To overcome this problem, a decision was made by the cadre officer for the provision of Mass Prevention Drugs for Filariasis by using the computer-based Vikor method based on the criteria set by the Aceh Singkil Health Service so that in making decisions it does not result in errors and performance to select cadre officers for Mass Prevention Drugs. fast
Pengembangan Teknologi Tepat Guna Toko Bunga dengan Penerapan Metode CRM Toko Risky Flower Sampit Seprianson Eliyeser; Dwi Tjahjo Seabtian
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 2 No. 1 (2021): Agustus 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In today's technological era, the development of systems and information technology is very important. What is different from building a system is the function and requirements of the system itself. On the other hand, most people already use computer hardware that already has a system that can access all information quickly and precisely, most of them already have high specifications that can provide information faster when the user needs the information to be used, then the system user it will be easier to do. Risky Flower is a shop that provides several types and sizes of flower boards for parties and events to suit their individual needs. Orders made so far are still not fast because it takes a very long time, where customers must communicate directly to the place of sale of the flower board by choosing the type and size that will be used for the event to be held according to customer needs. With the existence of a system, it is hoped that it can help the process of ordering flower boards and can provide information about what customers will need in making their choices quickly without having to go to the place where the flower board is sold. The proposed system fully uses the web-based Customer Relationship Management (CRM) method.
Sistem Informasi Penentuan Rute Pengiriman Barang di CV ASA Menggunakan Metode Algoritma Genetika Aditya Pratama Putra; Selviana Yunita
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 2 No. 1 (2021): Agustus 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Transportation is a problem that is often faced by companies in distributing their products. This problem relates to the decision making of product distribution routes that optimize the distance traveled, travel time, travel costs, number of vehicles operated, and other available resources. CV ASA is a company engaged in the distribution of goods which is addressed at Jalan Raya By Pass KM 4,4 Sampit City. The product distribution process carried out by the company is by taking orders. CV ASA stipulates the minimum use of transport capacity is 50% - 60%, but there are still 18 of the 35 travel routes with vehicle capacity usage that is less than 50%, which ranges from 9% to 49%. The problem that occurs in the company is a problem from the Capacitated Vehicle Routing Problem (CVRP) whose initial solution was solved using the Saving Matrix Method and then repaired with Genetic Algorithms
Analisa Data Kepuasaan Siswa Dalam Pembelajaran Online Menggunakan Metode Service Quality Ika Ardias Nursinta; Besus Maula Sulthon
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 2 No. 1 (2021): Agustus 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The student's satisfaction in this covid-19 era is crucial to figuring out what level of quality services are available in school institutions. The study aims to find out the students' level of satisfaction with online study at SMK al - amanah, this study is a descriptive quantitative study with a population of 102. In this matter student satisfaction will be measured using a servqual and importance performance analysis method in this case where it talks about dimensions of waited, responsiveness, assurance, anticipation and tangibles. The instrument of this study is done with the interview manner and the dissemination of the questionnaire. The data of the collected questionnaires are calculated and prepared, and the quality of the service is specifically known. With the spread of the questionnaire, it can be seen the result of a student's dissatisfaction with the service given. Data prepared for servqual methods with the help of SPSS 24.0 and importance performance analysis. The results from the selected student satisfaction data can be used as an evaluation material for schools to improve online learning. The results of this study show every dimension on the servqual that is tangibles, valence, responsiveness, assurance, and emphaty. Indicating that the gap or responsive gap is the biggest quality value dimension of -0.72 and the smallest gap or gap there is in realibility of -0.22

Page 1 of 1 | Total Record : 7