cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
-
Journal Mail Official
ejurnal.stmikbudidarma@gmail.com
Editorial Address
-
Location
Kota medan,
Sumatera utara
INDONESIA
The IJICS (International Journal of Informatics and Computer Science)
ISSN : 25488449     EISSN : 25488384     DOI : -
The IJICS (International Journal of Informatics and Computer Science) is e-Journal applied research in information technology, science and computer. This journal contains research articles and scientific studies. The IJICS is issued 2 (two) times a year in Mar (Issue No 1) and Sep (Issue No 2).
Arjuna Subject : -
Articles 9 Documents
Application Of Weight Sum Model (WSM) In Determining Special Allocation Funds Recipients Handoko, Dikki; Mesran, Mesran; Nasution, Surya Darma; Yuhandri, Yuhandri; Nurdiyanto, Heri
The IJICS (International Journal of Informatics and Computer Science) Vol 1, No 2 (2017): September 2017
Publisher : The IJICS (International Journal of Informatics and Computer Science)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In the management of education is not uncommon educational institutions sometimes receive sources of funds from outside, one of which comes from the Department of Education in the implementation of its duty to provide one allocation of funds called Special Allocation Fund (DAK). This assistance is from APBN revenues to areas devoted to schools to help fund special activities such as the addition or improvement of school facilities and infrastructure. The application of this special allocation grantee needs to use a Decision Support System (CMS) to allow decisions to be generated in favor of the DAK beneficiary. In the application of SPK required MCDM method, the Weight Sum Model (WSM), which is a simple method and able to generate ranking from the proposer alternatives in a special allocation fund.
Implementation of Triple Transposition Vegenere Cipher Algorithm and Cipher Block Chaining for Encoding Text Humendru, Fitarius; Zebua, Taronisokhi
The IJICS (International Journal of Informatics and Computer Science) Vol 2, No 1 (2018): March 2018
Publisher : The IJICS (International Journal of Informatics and Computer Science)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Security of confidential text data and personal is very important so that the data is not misused by other parties. Many cryptographic algorithms can be used to secure data to keep the originality of confidential data. This study describes the use of triple transposition vegenere cipher algorithm which is combined with cipher block chaining mode for encoding text data with the aim to optimizing randomize of ciphers generated so that the security of confidential of data text is more optimal
Sequitur Algorithm For Particular Character Compression Or Words Always Returned Buulolo, Efori
The IJICS (International Journal of Informatics and Computer Science) Vol 1, No 1 (2017): March 2017
Publisher : The IJICS (International Journal of Informatics and Computer Science)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Character pairs or recurrent words are often found on large documents. The document uses a large space in storage. At this time the storage with a large amount of space is not a problem anymore, with the availability of various media types of large data storage media and the price is very affordable. Although in the form of storage media is not a problem but in the storage and transmission of data, a large document would need an efficient for storage space and so does the case of data transmission. The Sequitur algorithm is one suitable algorithm for concluding context-free grammar into a compression to reduce repetitive input. The Sequitur algorithm is perfect for large document compression with paired or repeated characters so that the document uses more efficient storage space in the case of data transmission
Indonesian Proverbs Application Design by Applying Android Horspool Boyer Moore Algorithm Yahya, Andri Agus; Hasibuan, Nelly Astuti; Ramadhani, Putri
The IJICS (International Journal of Informatics and Computer Science) Vol 2, No 1 (2018): March 2018
Publisher : The IJICS (International Journal of Informatics and Computer Science)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Proverbs are words or groups of words which states a purpose or will, circumstance of someone, something, or something that express behavior, actions and things about a person indirectly, but implicitly convey a message that can be understood by both the reader and the listener. String matching is an algorithm to search for all occurrences of short and long strings, and for short strings called patterns and long strings called text. Horspool Algorithm is a simplification of the Boyer-Moore algorithm which in search of text is to search in large text to find the first pattern. Because the text sought can be very large (allowing hundreds of thousands of characters) it is important to use more efficient techniques based on that case, a search application based on android is made to make it easier for someone to find proverbs because not everyone understands this and that makes it more practical and efficient in terms of its use without having to carry proverbs in print media such as books.
Application Of Boyer Moore Algorithm for Text Searching Waruwu, Fince Tinus
The IJICS (International Journal of Informatics and Computer Science) Vol 1, No 1 (2017): March 2017
Publisher : The IJICS (International Journal of Informatics and Computer Science)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Technology at the moment is very rapid development in business, and education. Many developers or application makers are competing in improving science about the science of technology so as not to miss. Technology is an integral part of human life. Computer application is one part that is not separated from the computer. An application is a software that actually works to simplify the job. Thus, at this time already many computer applications are created. In the course, the application software always experienced improvements made by the manufacturer. These improvements lead to improved facilities to make it easier for users to work. In the world of education or the world of work a lot of work done by using computers such as typing by using text editor applications such as Microsoft Word in the manufacture of scientific work or other work, often mistakes in terms of writing words, often mistakes occur not because of intentional but because of community habits In abbreviating words when writing. It is necessary an application that can facilitate the examination of a writing in order to find the wrong word or abbreviated and automatically the application will fix it (text improvement). To make it easier to find the wrong word in the application, it needs string matching technique using Boyer Moore algorithm. The application is built with Microsoft Visual Studio 2008 and MySQL as the. 
The Application of The Nearest Neighbor Algorithm in Detecting Appendicitis Disease Handayani, Sari; Hasibuan, Nelly Astuti; Ramadhani, Putri
The IJICS (International Journal of Informatics and Computer Science) Vol 2, No 1 (2018): March 2018
Publisher : The IJICS (International Journal of Informatics and Computer Science)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The expert system is a branch of artificial intelligence that facilitates the knowledge of an expert into an application that can be used to help the work of experts. The knowledge base is formed by an inference engine that translates an experts knowledge. The result or output of the expert system can not guarantee its certainty. Therefore, it takes several methods that can be used to solve it. In this study, expert systems are applied to the medical or medical world. The following are related to the medical appendicitis disease or better known as appendicitis.Method used to improve the accuracy of the decision of the nearest neighbor algorithm. The nearest neighbor algorithm is an approach to finding a case with proximity or similarity between a new case and an old case. The results of this study is an engineering inference expertise with the aim to obtain clinical decisions of appendicitis diseases on the user (user) as medical treatment as early as
Russel Approximation Method And Vogel’s Approximation Method In Solving Transport Problem Hasibuan, Nelly Astuti
The IJICS (International Journal of Informatics and Computer Science) Vol 1, No 1 (2017): March 2017
Publisher : The IJICS (International Journal of Informatics and Computer Science)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Transportation problems can be regarded as one of the problems that occur routinely in a company in the process of distributing products from several sources to certain places. Transportation issues are included in one of the optimization issues in operations research aimed at minimizing transportation costs. Differences in transportation costs can be due to several factors such as distance gap, type of transport used and other things. The optimization of transportation cost can be done by using Vogel Approximation method and Russel Approximation Method. Method. To see the effectiveness of optimization conducted by the two methods is needed a comparison process.
Implementing Forward, Backward Chaining and Certainty Factor in Responsive Web-Based Expert System of Cow Disease Wahyudi, Rizki; Prasetyo, Wisnu Dwi
The IJICS (International Journal of Informatics and Computer Science) Vol 2, No 1 (2018): March 2018
Publisher : The IJICS (International Journal of Informatics and Computer Science)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This research aims to design and build expert systems of cow disease to assist farmers in identifying cattle diseases. A large number of cattle in Banyumas is not matched by the number of veterinarians, the Department of Fisheries and Livestock (DINKANAK). Banyumas records 961 cases of sick cows in 2016. This expert system is expected to assist cattle ranchers to identify cow disease and symptom-based remedies illness-symptoms. By using Inference Forward and Backward chaining which is a search method or tracking technique by using information from breeders, and Certainty Factor is used to accommodate the uncertainty of thinking of a data expert that is Doctor the process of extracting knowledge by interview. In this research system development using ESDLC (Expert System Development Life Cycle) with stages of Planning, Knowledge Acquisition, Implementation, and Evaluation. Testing is done with two approaches are Alpha Testing and Beta Testing. Alpha Testing conducted on the developer side to test the functional system using Black Box Testing method result all functional system can function well. Beta Testing is aimed at user acceptance by a Questionnaire method yields an average score of 76% or usability and the quality of system information is easy to understand.
Image Scrambling Using One Time Pad with Linear Congruent Key Generator Saputra, Imam
The IJICS (International Journal of Informatics and Computer Science) Vol 1, No 1 (2017): March 2017
Publisher : The IJICS (International Journal of Informatics and Computer Science)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With the changing of the times, more and more moments can be photographed. Digital imagery stores a lot of information through visual display. Many people perpetuate the things that are personal in the form of digital imagery, with so many files in the form of digital imagery that is private and not for publication. With the development of cloud computing systems, every image recorded through the smartphone will be synchronized with the online storage service provider. This has many advantages, such as users do not have to worry about the damage to storage devices that exist in their gadgets. But the disadvantage of this system is that if an account falls into the hands of an unauthorized person then photographs containing this personal information may be published by an unauthorized person, of course this will be very detrimental. One solution that can be used is to randomize the original image so that its visual appearance will not be like the actual visual display. One way that can be used for image randomization is by cryptographic techniques. The one time pad algorithm is a very powerful classical cryptographic algorithm and can not be solved by cryptanalis until now. One disadvantage of a one time pad algorithm is the key length must be the same as the length of the plaintext. This makes the algorithm unused because it is less practical in its key usage. To overcome this required a key generator that could generate randomly generated locks ie a linear congruent generator, thus the key length must be equal to the length of the plaintext can be generated only with a few variables. In this way, image randomization can be done with a strong and practical cryptographic algorithm.

Page 1 of 1 | Total Record : 9