cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
ijics.stmikbudidarma@gmail.com
Editorial Address
Jalan Sisingamangaraja No. 338, Simpang Limun, Medan, Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
The IJICS (International Journal of Informatics and Computer Science)
ISSN : 25488449     EISSN : 25488384     DOI : https://doi.org/10.30865/ijics
The The IJICS (International Journal of Informatics and Computer Science) covers the whole spectrum of intelligent informatics, which includes, but is not limited to : • Artificial Immune Systems, Ant Colonies, and Swarm Intelligence • Autonomous Agents and Multi-Agent Systems • Bayesian Networks and Probabilistic Reasoning • Biologically Inspired Intelligence • Brain-Computer Interfacing • Business Intelligence • Chaos theory and intelligent control systems • Clustering and Data Analysis • Complex Systems and Applications • Computational Intelligence and Soft Computing • Cognitive systems • Distributed Intelligent Systems • Database Management and Information Retrieval • Evolutionary computation and DNA/cellular/molecular computing • Expert Systems • Fault detection, fault analysis and diagnostics • Fusion of Neural Networks and Fuzzy Systems • Green and Renewable Energy Systems • Human Interface, Human-Computer Interaction, Human Information Processing • Hybrid and Distributed Algorithms • High Performance Computing • Information storage, security, integrity, privacy and trust • Image and Speech Signal Processing • Knowledge Based Systems, Knowledge Networks • Knowledge discovery and ontology engineering • Machine Learning, Reinforcement Learning • Memetic Computing • Multimedia and Applications • Networked Control Systems • Neural Networks and Applications • Natural Language Processing • Optimization and Decision Making • Pattern Classification, Recognition, speech recognition and synthesis • Robotic Intelligence • Rough sets and granular computing • Robustness Analysis • Self-Organizing Systems • Social Intelligence • Soft computing in P2P, Grid, Cloud and Internet Computing Technologies • Stochastic systems • Support Vector Machines • Ubiquitous, grid and high performance computing • Virtual Reality in Engineering Applications • Web and mobile Intelligence, and Big Data
Articles 32 Documents
Comparison Analysis with Huffman Algorithm and Goldbach Codes Algorithm in File Compression Text Using the Method Exponential Comparison Tanjung, Abu Sani; Nasution, Surya Darma
The IJICS (International Journal of Informatics and Computer Science) Vol 4, No 1 (2020): March 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (201.25 KB) | DOI: 10.30865/ijics.v4i1.1387

Abstract

With the development of technology at this time many people know about compression. In simple compression is a process to shrink the file from its original size. At this time compression applications that are often used are WinZip, WinRar, and 7-Zip, namely with the aim of compressing documents and saving space on memory or data transmission. Compressed data can be in the form of images, audio, video and text. The use of the Huffman algorithm and the Goldbach Codes algorithm in compressing text files is intended to provide enormous benefits in the sending and storage process and requires less memory space compared to uncompressed text. The algorithm starts by providing a string of inputs as input, how to produce an algorithm output in the form of a binary string or code that translates each input string, so that the string has a small number of bits compared to strings that are not compressed. Thus, the problem is how to obtain the code with sorted characters and frequency tables as input and shorter binary code as output. In applying the Huffman algorithm and the Goldbach Codes algorithm in compressing text files is very good, the results were not reduced from the original file or there was no reduction
Decision Support System In Sous Chef De Partie Selection Using Simple Method Additive Weighting (SAW) (Case Study: Restaurant Goela Batoe) Budi, Iwan Setia; Syahrizal, Muhammad
The IJICS (International Journal of Informatics and Computer Science) Vol 1, No 2 (2017): September 2017
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (304.36 KB) | DOI: 10.30865/ijics.v1i2.1349

Abstract

The SAW method is also known as the weighted addition method. The basic concept of the SAW method is to find the weighted sum of the performance ratings on each alternative of all attributes. The SAW method requires the decision matrix normalization process (X) to a scale that can compare with all available alternative ratings.
Implementation of LCM (Linear Congruent Method) Method in Region Song Game Harahap, Addinul Arfansyah; Hasibuan, Nelly Astuti
The IJICS (International Journal of Informatics and Computer Science) Vol 4, No 2 (2020): September 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (378.932 KB) | DOI: 10.30865/ijics.v4i2.2118

Abstract

The Regional Song Game is a game that educates players to hone the ability of knowledge about folk songs in the form of questions given the Regional Song game. With the game Regional Songs, players can expand the ability of players about the knowledge of regional songs. Aside from being a means of entertainment, games can also be an exciting learning medium and do not make players bored, so it becomes a pleasant learning atmosphere. The linear congruent method (LCM) is a random number generator method that is widely used by computer programs. The application of the Linear Congruent Method (LCM) in the Regional Song game is intended to randomize the questions that will be displayed by the Regional Song game. Regional Songs Game is an application designed to provide insights about folk songs for the players. This game aims to reintroduce folk songs to the people lost by the ages.
Data Compression Using Stout Codes Nasution, Surya Darma
The IJICS (International Journal of Informatics and Computer Science) Vol 3, No 1 (2019): March 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (216.479 KB) | DOI: 10.30865/ijics.v3i1.1362

Abstract

The need for data compression is now very important because it is affected by human nature that tends to collect data and also influenced by the need for a process for fast data transfer because the data size becomes smaller. Now many compression algorithms can be used, one of which is the stout codes algorithm. how the stout code algorithm works by encoding characters that often appear with smaller codes than characters with fewer occurrences. The results of data compression in the form of text with the algorithm of the stout code algorithm is the size of the text data becomes smaller with a compression ratio 60% and space saving 40%.
How to Create and Randomize a Vegenere Cipher Key Based on the Key Procedure of RC4+ Algorithm Zebua, Taronisokhi; Ndruru, Eferoni
The IJICS (International Journal of Informatics and Computer Science) Vol 3, No 2 (2019): September 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (368.932 KB) | DOI: 10.30865/ijics.v3i2.1404

Abstract

The security of data not only depends on the complexity of the algorithm used, but one of the more important things to safeguard is key. The vegenere cipher algorithm is one of the common and easy to implement algorithms, but this algorithm is very easy to break with kasiki techniques by analyzing the word of cipher and keyword that have repetitive patterns. The RC4+ algorithm has the advantage of generating and generating fairly random keys. This research describes how to use the RC4+ key generation procedure to create and randomized the keys used in the vegenere cipher algorithm, to decrease recurrence of the same character of the cipher and character of the key
Application Of Boyer Moore Algorithm for Text Searching Waruwu, Fince Tinus
The IJICS (International Journal of Informatics and Computer Science) Vol 1, No 1 (2017): March 2017
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (254.52 KB) | DOI: 10.30865/ijics.v1i1.385

Abstract

Technology at the moment is very rapid development in business, and education. Many developers or application makers are competing in improving science about the science of technology so as not to miss. Technology is an integral part of human life. Computer application is one part that is not separated from the computer. An application is a software that actually works to simplify the job. Thus, at this time already many computer applications are created. In the course, the application software always experienced improvements made by the manufacturer. These improvements lead to improved facilities to make it easier for users to work. In the world of education or the world of work a lot of work done by using computers such as typing by using text editor applications such as Microsoft Word in the manufacture of scientific work or other work, often mistakes in terms of writing words, often mistakes occur not because of intentional but because of community habits In abbreviating words when writing. It is necessary an application that can facilitate the examination of a writing in order to find the wrong word or abbreviated and automatically the application will fix it (text improvement). To make it easier to find the wrong word in the application, it needs string matching technique using Boyer Moore algorithm. The application is built with Microsoft Visual Studio 2008 and MySQL as the. 
Decision Support System for Determination of Village Fund Allocation Using AHP Method Sianipar, Vasma Vitriani; Wanto, Anjar; Safii, M
The IJICS (International Journal of Informatics and Computer Science) Vol 4, No 1 (2020): March 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (350.263 KB) | DOI: 10.30865/ijics.v4i1.2101

Abstract

This study aims to describe the management of the allocation of village funds in physical development in the village of Siborna, Panei Subdistrict, Simalungun Regency and to identify inhibiting factors and supporting factors in managing village fund allocation. The focus of this research is the management of village fund allocations which include: planning, implementation. The determination of the allocation of village funds will later use the Analytical Hierarchy Process (AHP) method with 4 criteria including: villagers, rural poor, village area and Village Geographical Difficulty Index. Alternative Samples in this study were 4 villages, including the villages of Sosor Hamlet, Simpang Bahbirong Hamlet, Hutabagasan Hamlet and Kebun Sayur Hamlet. The results of this study using the AHP method obtained by the Village of Vegetable Farm Village is an alternative with the highest value that is eligible to get a village fund allocation from the government with a value of 3,0000
Indonesian Proverbs Application Design by Applying Android Horspool Boyer Moore Algorithm Yahya, Andri Agus; Hasibuan, Nelly Astuti; Ramadhani, Putri
The IJICS (International Journal of Informatics and Computer Science) Vol 2, No 1 (2018): March 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (265.645 KB) | DOI: 10.30865/ijics.v2i1.998

Abstract

Proverbs are words or groups of words which states a purpose or will, circumstance of someone, something, or something that express behavior, actions and things about a person indirectly, but implicitly convey a message that can be understood by both the reader and the listener. String matching is an algorithm to search for all occurrences of short and long strings, and for short strings called patterns and long strings called text. Horspool Algorithm is a simplification of the Boyer-Moore algorithm which in search of text is to search in large text to find the first pattern. Because the text sought can be very large (allowing hundreds of thousands of characters) it is important to use more efficient techniques based on that case, a search application based on android is made to make it easier for someone to find proverbs because not everyone understands this and that makes it more practical and efficient in terms of its use without having to carry proverbs in print media such as books.
Design of Steganographic Applications in A Processed Image using Algorithm Dynamic Markov Compression Lubis, Akmal Dirgantara; Ginting, Garuda; Fadlina, Fadlina
The IJICS (International Journal of Informatics and Computer Science) Vol 4, No 2 (2020): September 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (394.818 KB) | DOI: 10.30865/ijics.v4i2.2120

Abstract

Confidential text data is an important matter that needs to be protected and kept confidential. Secret text data is a treasure where many people who want to try to find out first find out its contents. Therefore it is not uncommon for crimes to appear intentionally committed by irresponsible people. With the increasing number of people who commit crimes who deliberately steal confidential data and damage confidential text data so that it can harm certain parties. There have been several attempts to deal with the issue of security of confidential data sent over the internet, including using cryptographic and steganographic techniques
Implementation of Weight Sum Model(WSM) in the Selection of Football Athletes Sianturi, Lince Tomoria
The IJICS (International Journal of Informatics and Computer Science) Vol 3, No 1 (2019): March 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (237.988 KB) | DOI: 10.30865/ijics.v3i1.1358

Abstract

Every soccer team has a standard that is used by coaches in determining athletes that fit the criteria owned by athletes. In this study, researchers used a decision support system (SPK) with the Weight Sum Model (WSM) method, which assesses the results of the criteria needed in the selection of soccer athletes. Decisions made in applying the WSM method will produce recommendations according to the standards used by the trainer. The purpose of this research is to apply the WSM method in selecting soccer athletes based on the desired category. The existence of this system is expected to make selection more objective for trainers in making decisions

Page 1 of 4 | Total Record : 32