cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
jurikom.stmikbd@gmail.com
Editorial Address
STMIK Budi Darma Jalan Sisingamangaraja No. 338 Simpang Limun Medan - Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
JURIKOM (Jurnal Riset Komputer)
JURIKOM (Jurnal Riset Komputer) membahas ilmu dibidang Informatika, Sistem Informasi, Manajemen Informatika, DSS, AI, ES, Jaringan, sebagai wadah dalam menuangkan hasil penelitian baik secara konseptual maupun teknis yang berkaitan dengan Teknologi Informatika dan Komputer. Topik utama yang diterbitkan mencakup: 1. Teknik Informatika 2. Sistem Informasi 3. Sistem Pendukung Keputusan 4. Sistem Pakar 5. Kecerdasan Buatan 6. Manajemen Informasi 7. Data Mining 8. Big Data 9. Jaringan Komputer 10. Dan lain-lain (topik lainnya yang berhubungan dengan Teknologi Informati dan komputer)
Articles 300 Documents
PENERAPAN ALGORITMA BEE COLONY OPTIMIZATION DALAM PENCARIAN RUTE TERCEPAT RUMAH SAKIT DI KOTA BOGOR Pratama, Danar Julian
JURIKOM (Jurnal Riset Komputer) Vol 6, No 3 (2019): Juni 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (445.561 KB) | DOI: 10.30865/jurikom.v6i3.1181

Abstract

Hospitals are an important part of health and are related to someone's dead life. First aid in pawing at someone who is sick is very important. Then an optimization system is needed to help patients find the shortest route to the hospital so that patients who are sick can be more efficient. This study uses the Bee Colony algorithm because it has an efficient optimization capability to solve the problem of finding the shortest route. The results obtained from this study, namely the Bee Colony algorithm can be used to find the shortest route. The more bees released the greater the chance of finding the shortest route.
SISTEM PAKAR MENDIAGNOSA PENYAKIT PADA KELINCI DENGAN MENGGUNAKAN METODE DEMPSTER SHAFER Sianturi, Dorkas
JURIKOM (Jurnal Riset Komputer) Vol 6, No 2 (2019): April 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (317.169 KB) | DOI: 10.30865/jurikom.v6i2.1314

Abstract

Skin disease in rabbits is one of the diseases that are often experienced by rabbits, one of which is Demodexcosis. The main cause is the attack of parasites or fleas that are very small in size. This disease can attack rabbits as well as adults. Symptoms that arise from demodexcosis are skin redness, thickening of the skin and swollen follicle fur, disrupted growth. However, many people experience difficulties due to the lack of knowledge about various diseases that attack rabbits and the inadequate and healthy rabbit feed. To detect a disease that is being overwritten and thus we can take the right steps to treat it without bringing the animal to an expert or veterinarian. In this case the expert system can provide knowledge designed to model the problem solving ability like an expert. An expert system was developed in order to be able to assist the tasks of experts with the help of a system that has knowledge, without having to have an expert working in that place. There are several methods that can be applied in expert systems, and one of them is the dempster shafer method. Dempster shafer is one of the mathematical theories to prove hypotheses based on belief functions and plausible reasoning, which are used to combine separate pieces of information or evidence to calculate the probability of an event. The application that will be used in building this system is PHP using a MySQL database.
IMPLEMENTASI ALGORITMA ELGAMAL DENGAN PEMBANGKIT BILANGAN PRIMA LEHMANN DAN ALGORITMA LEAST SIGNIFICANT BIT (LSB) DENGAN COVER IMAGE BITMAP UNTUK KEAMANAN DATA TEXT Rahmansyah, Edi
JURIKOM (Jurnal Riset Komputer) Vol 6, No 1 (2019): Februari 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (264.326 KB) | DOI: 10.30865/jurikom.v6i1.1301

Abstract

Encryption is the process of securing an information by making the information into a random form so that the information content cannot be read or understood. Algorithms used for encryption have evolved, ranging from classical algorithms to modern algorithms. But encryption still has weaknesses, one of which is the result of encryption will produce a random character which will raise suspicion that the information is important information. Cryptanalysis is a technique used to solve cryptography, where random data can be returned to the original data, so cryptography is not entirely safe. Because of these shortcomings, data security techniques are also developed by inserting information into media such as images or videos so that the information is not visible, the technique is called steganography. Steganalysis is a technique used to find out whether an image has information that is inserted, so that with this technique steganography is not fully safe.
IMPLEMENTASI ACCESS CONTROL LIST PADA MIKROTIK DALAM MENGAMANKAN KONEKSI INTERNET KOPERASI SUMBER DANA MUTIARA Sihotang, Bil Klinton; Sumarno, Sumarno; Damanik, Bahrudi Efendi
JURIKOM (Jurnal Riset Komputer) Vol 7, No 2 (2020): April 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (331.472 KB) | DOI: 10.30865/jurikom.v7i2.2010

Abstract

The need for information and internet access at this time is very high. To accept it is wrong only with computer networks as a medium. In a network that requires a network that has been segmented using a Virtual Local Area Network (VLAN), the application of an Access Control List (ACL) is required to be granted access rights for each device in the network. The Access Control List (ACL) can filter the data traffic of a network by controlling whether the packets are passed or issued. A network is built using several different network devices, one of which is a router. A router is a tool that can process different data packet networks (between networks) through a process called routing. lots of companies that produce routers, mikrotik is one of the companies that produce routers. mikrotik is easy to do because it uses Winbox in Gui's view, besides that the hotspot server in it is provided with several management facilities that can be arranged according to network requirements
IMPLEMENTASI REDUKSI NOISE PADA CITRA ULTRASONOGRAFI (USG) MENGGUNAKAN METODE MEDIAN FILTER Wati, Fadila
JURIKOM (Jurnal Riset Komputer) Vol 5, No 6 (2018): Desember 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (202.737 KB) | DOI: 10.30865/jurikom.v5i6.1208

Abstract

A data or information is presented not only in the form of text data but also can be in the form of audio, video, and images. In this day and age information is very important and necessary, as is the information contained in the image. Image (image) or other terms for images is one of the multimedia components that play an important role as a form of visual information. Compared to text data, images have a lot of information. In digital formatted images damage often occurs which is defined as noise. But sometimes images can also experience a decrease, namely degradation or deterioration in quality caused by noise / noise, too contrasting colors, blurring, and others. There are several types of noise in image processing, one of which is Salt & Pepper noise. The Salt & Pepper Noise is shaped like black and white spots on the image. To reduce this noise, a method is needed, one of which is the median filter. The method used in this study is the median filter.
ESTIMASI BIAYA SOFTWARE FAS (FINANCING ANALYSIS SYSTEM) MENGGUNAKAN METODE FUNCTION POINT (STUDI KASUS PADA PT BPRS LANTABUR TEBUIRENG) Kristi, Juliana; Aisah, Siti Nur; Dewi, Renny Sari
JURIKOM (Jurnal Riset Komputer) Vol 7, No 1 (2020): Februari 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (338.335 KB) | DOI: 10.30865/jurikom.v7i1.1891

Abstract

Software cost estimation is the process of predicting software development efforts. The basic input of software cost estimation is the measurement metric. Projects often experience delays, over-budget, and are not completed due to failure to estimate software development costs. PT BPRS (Bank Perkreditan Rakyat Syariah) Lanatabur Tebuireng determines the estimated cost based on the amount of human resources, features needed, and funds owned. This study explains the estimated costs of the FAS (Financing Analysis System) software at PT BPRS Lantabur Tebuireng using the Function Point method. Function Point is a method of measuring software functionality based on the type of user function that is External Input, External Output, External Inquire, Internal Logic File, and External Interface File as well as technical calculations of software development. The final of the FAS (Financing Analysis System) study cost around IDR 94,797,120.
PERANCANGAN APLIKASI PENGENALAN ALAT-ALAT LITURGI MENGGUNAKAN AUGMENTED REALITY BERBASIS MOBILE Pertiwi, Rahayu Putri; Nurhayati, Oki Dwi; Isnanto, Rizal
JURIKOM (Jurnal Riset Komputer) Vol 6, No 6 (2019): Desember 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (335.881 KB) | DOI: 10.30865/jurikom.v6i6.1738

Abstract

Catholicism, is one of the recognized religions in Indonesia. Today many Catholics do not know about their own means of worship. Therefore it is necessary to conduct a study to create an Android application with Augmented Reality technology as an alternative introduction to liturgical devices. The development of this application uses the Multimedia Development Life Cycle. This application will display 3D object visualization of liturgical instruments along with a Description Panel and buttons for sounding, and allows users to zoom in, zoom out and move objects. The application is built using Blender3D, Unity3D, and Vuforia SDK.  Results of application testing are the function keys on the application 100% successful. The ideal detection results are obtained in a room with a light intensity of at least 38 lux and a maximum of 180 lux, a distance of 15-30 cm, and an angle of 60o-90o. Testing the detection of barrier markers, the ideal result of 100% success is shown if the marker is not blocked by anything.
PENGAMANAN PESAN TEKS E-MAIL MENGGUNAKAN METODE ALGORITMA BIFID DAN FEEDBACK CIPHER Wulandari, Siska
JURIKOM (Jurnal Riset Komputer) Vol 6, No 5 (2019): Oktober 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (279.83 KB) | DOI: 10.30865/jurikom.v6i5.1646

Abstract

One of the most widely used internet applications is electronic message sending, called e-mail. As time goes by, sending messages via e-mail becomes one of the important things. But there are some threats that do not know when using e-mails such as eavesdropping on e-mail contents, changing e-mail contents by unauthorized people and making e-mails no longer authentic. The technique of securing text messages or data is known as cryptography. In cryptography there are several methods that are quite important in securing data, to maintain data confidentiality one of which is encryption (coding). Decryption (original text) of one of the cryptographic algorithms, namely bifid cipher and feedbak cipher. Bifid cipher was first discovered by Felix Delastelle in 1901. Bifid cioher encrypts by randomizing the position of the row and column of letters in the message that corresponds to the 5X5 square key board while the Cipher Feedback Method uses the Shift Register system, which is processed first is the Initialization Vector in the Encryption with Key algorithm. After processing, the resulting bits will go through a bit selection process, usually the leftmost bits, then encrypted with Plaintext to produce the Ciphertext. By applying a combination of the two algorithms, the bifid cipher algorithm and the feedback cipher, it is expected that the message sent in the e-mail will be coded so that unauthorized parties do not know the meaning of the message being sent. And can maintain the authenticity of the messages sent
PENERAPAN METODE HUNGARIAN DALAM OPTIMASI BIAYA MARKETING PADA PT. JOVI KARUNIA JAYA Samosir, Nofranti
JURIKOM (Jurnal Riset Komputer) Vol 6, No 4 (2019): Agustus 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (175.414 KB) | DOI: 10.30865/jurikom.v6i4.1401

Abstract

Marketing is a person who works in marketing, able to serve, market, able to interact directly with consumers. In the business world more and more rivals are able to drop or create a bankrupt company, if it has a high expenditure while the income is small. Companies that go bankrupt because of the cost to employees are too large like in completing the work when doing product offer marketing letters. Each employee has an assignment fee for different jobs, because the nature or manner of each job is different. Every employee has different skill level, work experience, different educational background, so it requires different cost, so the cost to each employee must be minimized.
PENERAPAN FUZZY STRING MATCHING PADA APLIKASI PENCARIAN JUDUL SKRIPSI TEKNIK INFORMATIKA BERBASIS ANDROID Khairunnisa, Khairunnisa
JURIKOM (Jurnal Riset Komputer) Vol 6, No 3 (2019): Juni 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (150.779 KB) | DOI: 10.30865/jurikom.v6i3.1339

Abstract

The library is the center of the gathering of various information and knowledge both in the form of books and other recording materials to meet the needs of the learning process. In addition to storing books, the library also stores final assignment documents or thesis of students who have graduated from the college. This description can usually be used as a reference material for students in preparing the final assignment. The more years the number of thesis increases so that it requires a storage space the wider. The problem that is often faced by students is that the thesis search process needed as reference material takes a long time. From these problems it is necessary to make innovations by utilizing information technology. Mobile phones are not only used to call and send messages, but cellphones also have various other functions such as internet access, audio and video player media, and so on. Android is one of the operating systems for mobile phones among the development of other mobile operating systems such as Windows Mobile, Symbian, Blackberry OS and others. In this study, we will build a repository application for an Android-based thesis search that is built by applying the Fuzzy String Matching algorithm. Fuzzy String Matching Algorithm is one of the string search methods that uses the approach process to the pattern of the string being searched for. Search for the same string and also the string that approaches the other strings collected in a container or dictionary. By utilizing the Fuzzy String Matching algorithm in the thesis search application on informatics engineering, it is expected to be able to search quickly and efficiently.

Page 1 of 30 | Total Record : 300