cover
Contact Name
Soeb Aripin
Contact Email
jurnal.jutik@gmail.com
Phone
+6285297616304
Journal Mail Official
jurnal.jutik@gmail.com
Editorial Address
Komplek Senda Residence Jln. Payanibung Ujung Dalu Sepuluh-B Tanjung Morawa, Deli Serdang Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
Jurnal Kajian Ilmiah Teknologi Informasi dan Komputer
ISSN : -     EISSN : 29629055     DOI : https://doi.org/10.62866/jutik.v2i1.110
Jurnal Kajian Ilmiah Teknologi Informasi dan Komputer, membahas ilmu dibidang Informatika, Sistem Informasi, Manajemen Informatika, DSS, AI, ES, Jaringan, sebagai wadah dalam menuangkan hasil penelitian baik secara konseptual maupun teknis yang berkaitan dengan Teknologi Informatika dan Komputer. Bidang kajian dari Jurnal Sains dan Teknologi Informasi, yaitu: Sains & Teknologi, Ilmu Komputer, Teknologi Terapan, Teknik, Manajemen Informatika, Data Mining, Sistem Pakar, Kriptografi, Sistem Pendukung Keputusan, dan bidang yang menerapkan Komputer lainnya
Articles 25 Documents
Perancangan Aplikasi Pembangkit Identitas File Dokumen Menerapkan Algoritma Fungsi HASH MD2 Ndruru, Suriani
Jurnal Kajian Ilmiah Teknologi Informasi dan Komputer Vol 3 No 1 (2024): November 2024
Publisher : CV. Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62866/jutik.v3i1.134

Abstract

Currently in the digital world era. However, now many industries have switched to digital technology such as photos, videos, music and so on. Of course, this change brings many benefits to us in terms of data access speed. Another advantage of computer technology is in terms of copying and generating digital file identities where the results will have the same identity value. So if you want to distinguish one document file from another, it will be very difficult because you have to check the entire contents of the document file. In cryptography there is a hash function which is a one-way function that can generate the identity of a file. Where if the document file has the same contents, it will produce the same hash value. This can be used to identify the same document file. In the hash function there is an MD2 method or the design of a document file identity generator application applies the MD2 hash function algorithm which is one of the hashing algorithms that is often used to encrypt data with a width of 20 bytes or 160 bits. By applying this algorithm to the identity document application, the results of the document file search are grouped based on the same hash value and users can easily and quickly delete document files with the same identity without having to open and read the contents of the file.
Analisa Kemudahan Penggunaan Aplikasi AdaKami Dengan Menerapkan Metode Technology Acceptance Model (TAM) Lubis, Julia Indriani; Siregar, Rizky Anggraini
Jurnal Kajian Ilmiah Teknologi Informasi dan Komputer Vol 3 No 1 (2024): November 2024
Publisher : CV. Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62866/jutik.v3i1.159

Abstract

The problem in this research is that the AdaKami application often gets complaints from users, such as not being able to use or withdraw money even though the limit is high, difficulties in the application where errors often occur in the payment system, and users are subject to fines for late payments. To overcome these problems, research This method uses the Technology Acceptance Model (TAM) to analyze the ease of the AdaKami application. With this article, users can understand how to use the AdaKami application. We hope that the data collection carried out can help users use the features contained in the application. Overall, the PEAOU variable is included in the strongly agree category and it can be concluded that using the AdaKami application is relatively easy. With the results obtained by the PEOU variable of 68.4%.
Implementasi Metode WASPAS Dalam Penilaian Kinerja ASN Dengan Pembobotan Menggunakan Metode ROC Arya, Raihan Dwi; Ardiansyah, Rian
Jurnal Kajian Ilmiah Teknologi Informasi dan Komputer Vol 3 No 1 (2024): November 2024
Publisher : CV. Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62866/jutik.v3i1.160

Abstract

It is very important to assess ASN performance for resource management because it can be used for decision making in a policy. The aim of this research is to create a Decesion Support System for assessing ASN perfoance using the WASPAS method and ROC weighting. ASN performance assessments are carried out using methods based on assessing attendance and punctuality, so that the assessment process is still considered to be less effective in determining performance assessments. The result form the calculation of the highest ASN performance assessment were obtained by no.2 with a final score of 0.958 and ranked 1st in the ranking and no.1 hot the lowest score with a final score 0.906 and ranked 5th.
Implementasi Algoritma Additive Code Untuk Mengkompresi File PDF Pada Aplikasi E-Archive Ningsih, Fitri Ayu
Jurnal Kajian Ilmiah Teknologi Informasi dan Komputer Vol 3 No 1 (2024): November 2024
Publisher : CV. Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62866/jutik.v3i1.161

Abstract

Problems with the need for storage space in the E-Archive application is one of the main problems that can affect the performance of own E-Archive application. This is due to the large number of PDF files large files stored in the E-Archive application database. One of solutions that can be done to overcome this problem are compress PDF files. The compression process in this study was carried out based on an algorithm Additive Code. Based on the results of the tests performed, the Ratio of Compression (RC) of 1.33, Compression ratio (Cr) reduced by as much 75%, Redundancy (Rd) is reduced by 25% and Space saving (Ss) is reduced as much as 25%. The results show that the need for storage space the E-Archive application database is more optimal than before the process was implemented compression.
Sistem Pendukung Keputusan Untuk Penentuan Rumah Tidak Layak Huni Di Desa Lubuk Besar Kecamatan Datuk Lima Puluh Dengan Menggunakan Metode MOORA Aygisella, Licha
Jurnal Kajian Ilmiah Teknologi Informasi dan Komputer Vol 3 No 1 (2024): November 2024
Publisher : CV. Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62866/jutik.v3i1.166

Abstract

Pneumonia Assistance for uninhabitable houses (RTLH) is a problem that is of serious concern to the government of Lubuk Besar Village. At the Lubuk Besar Village Office, which still uses a manual method in determining recipients of uninhabitable housing assistance, data processing has not been computerized. This assistance is obtained if the prospective beneficiary is deemed to meet the requirements and criteria that have been determined, for example: the floor is still dirt, the walls are still bamboo, the roof structure is still thatch, the land area and so on. However, the existence of problems in determining the assistance made it difficult for the selection of prospective recipients of house renovation assistance. One solution to this problem is to use a Decision Support System (SPK) that can assist the Lubuk Besar Village Office in making decisions about determining recipients of uninhabitable housing assistance (RTLH) so that they are right on target. The MOORA method is a method that optimizes many objectives based on ratio analysis. the way this method works is to determine the ranking quickly and on target and to find out the highest to lowest scores in a selection for determining uninhabitable houses in Lubuk Besar Village, Datuk Lima Puluh District

Page 3 of 3 | Total Record : 25