Instal : Jurnal Komputer
Latest Publications


TOTAL DOCUMENTS

15
(FIVE YEARS 15)

H-INDEX

0
(FIVE YEARS 0)

Published By Cattleya Darmaya Fortuna

2085-5702

2021 ◽  
Vol 12 (02) ◽  
pp. 69-75
Author(s):  
Elfrida Tamba

Receipt of compensation funds for underprivileged students needs to be selected so that they are not wrong in providing assistance, so that the recipients of assistance are students who deserve to receive. The decision support system is an effective way of selecting students who need compensation funds. The criteria are as a stage for selecting students who are entitled to grant aid, with these criteria all students who participate in receiving the compensation funds will be ranked. The results of the ranking are based on calculations, the first order is Farhan Rifai with a value of0.8; second place is Sidratul Muntaha with a value of 0.7666


2021 ◽  
Vol 12 (02) ◽  
pp. 46-53
Author(s):  
Bobi Akbar

In data communication, against a data security method known as cryptography (Cryptography). Cryptography is a data security method that can be used to maintain data confidentiality, data authenticity or integrity, and the authenticity of the sender. This method is intended so that important information of a limited or confidential nature sent through public telecommunications facilities cannot be known or utilized by unauthorized parties. In this case, data security is also needed at the internet cafe (internet cafe). Warnet which is a place that provides Interconnection Networking that connects computers to form a network system that covers the whole world (global). Each cafe requires a billing system that is used to determine the state of the user in using the facilities at the cafe, starting from how long it takes to use and how much it costs each user. For this reason, so that the data on the billing system cannot be manipulated or modified by unauthorized persons, it is necessary to secure data. The data security method that will be used is cryptography, especially by using the RC4 stream cipher.


2021 ◽  
Vol 12 (02) ◽  
pp. 61-68
Author(s):  
Cerlinto Hutagalung

Banker's algorithm is an algorithm that models a bank in a small town dealing with a set of customers. This banker algorithm is used to deal with queuing problems in banking. In this case, one of them is how to simulate queues in banking. In this study, the design and manufacture of simulation software is used to help simulate whether a system is in a safe state or an unsafe state, in a safe condition the process is continued but if the process is unsafe the process is delayed until the system is in a safe state. The result of this research is a banker algorithm simulation software that models a banker who is dealing with a group of customers in a bank.


2021 ◽  
Vol 12 (02) ◽  
pp. 54-60
Author(s):  
Tejo Herianto

Scheduling lectures using the ant algorithm is able to provide alternative solutions for scheduling lectures that want a certain time optimally. In this research, the method used is literature study. This literature study was carried out by reading books and literature related to scheduling and ant algorithms. In addition to using literature studies, researchers also use field studies. This is intended to get a true picture of the state of the institution by observing directly at the institution, by means of observation or data collection methods by conducting interviews on the parts involved in the process of preparing the class schedule. From the results of the analysis obtained: scheduling lectures using the ant algorithm is able to provide solutions in scheduling. The ant algorithm can be applied to create a class schedule with optimal results, the ant algorithm is able to provide solutions in the preparation of a lecture schedule that requires a certain time.


2021 ◽  
Vol 12 (02) ◽  
pp. 38-45
Author(s):  
Dapit Indra

Nowadays research and development of medicinal plants both at home and abroad is growing rapidly. Research is mainly developing in terms of pharmacology and phytochemicals based on indications of medicinal plants that have been used by some people with empirically proven efficacy. The results of this study, of course, further strengthen the users of medicinal plants for their efficacy and usefulness. Moreover, many researchers have also conducted toxicological tests to determine the safety of medicinal plants that are often used for long-term use, as well as incidental use. The traditional healers also have a lot of knowledge of poisonous medicinal plants, but still use them because they know how to process them.


2021 ◽  
Vol 11 (02) ◽  
pp. 66-76
Author(s):  
Saeful Bahri ◽  
Syarifah Fadillah Rezky ◽  
Junus Sinuraya

SMS from these various considerations is feasible to use. The level of ownership of cellular phones and affordable costs are considerations that support the adoption of this technology to be widely applied for the application of information system development in the present and in the future.Distance and long time are no longer a problem that can hinder obtaining information about the exam schedule, the SMS received does not come directly from the sender, but comes from the SMS Center. So, before the SMS reaches the recipient, the SMS actually enters the SMS Center first,The PDU contains not only the message, but also a lot of information about the sender. Starting from the sender's number, the sender's SMSC number, the validity time of the SMS, and so on. Everything is built in the form of hexadecimal numbers. SMS-based student exam scheduling using AT Command GSM which is used as a command in communication with the serial port. Scheduling with the AT command technique is very effective as information for students.


2021 ◽  
Vol 11 (02) ◽  
pp. 53-65
Author(s):  
Bagus Suteja

Modeling with neural networks is the learning and adjustment of an object. The perceptron method is a learning method with supervision in a neural network system. In designing a neural network that needs to be considered is the number of specifications that will be identified. A neural network consists of a number of neurons and a number of inputs. To identify some letters, it takes several neurons to distinguish them. These neurons will generate a combination value that is used to identify the letters. so that the resulting network must have parameters that can be set by changing through the rules of learning with supervision.


2021 ◽  
Vol 11 (02) ◽  
pp. 43-52
Author(s):  
Irpan Nainggolan

Digital engineering is one of the subjects taught at STMIK Budidarma Medan, where one of the materials discussed is logic gates. The learning process still uses the lecture method, namely delivering the material orally accompanied by the division of tasks and exercises. The absence of simulation is a problem for lecturers in delivering material. Computer Assisted Instruction (CAI) is a learning method that uses computers as a tool to support the teaching and learning process. This method has learning models such as: tutorials, exercises, simulations, and games. With the application of this method, the learning process becomes varied and attracts the attention of students. Based on that.


2021 ◽  
Vol 11 (02) ◽  
pp. 26-32
Author(s):  
Hery Sunandar

The problem of work performance at the foundation has not been maximally measured, only a review of achievements based on an assessment that is considered not perspective because it is not based on accurate points from employees. Regarding solving complex problems based on employee assessments, foundation leaders need to be careful to collect more detailed, accurate, and complete data. Therefore, it is necessary to have a program that can analyze the work and achievements of employees at the foundation. So one of the ways to analyze the assessment is the Analytical Hierarchy Process.


2021 ◽  
Vol 11 (02) ◽  
pp. 33-42
Author(s):  
Marjono Sugiono

This study describes the collaboration of technological developments with learning systems in elementary schools with the sophistication of technology, it is easier for teachers to deliver learning materials to students without face to face. Authors get is that in the process of making a new system, it can be seen that to compile good information, the steps that need to be taken are to study the existing system, then design a system that can solve the problem, and finally implement the designed system.


Sign in / Sign up

Export Citation Format

Share Document