JURIKOM (Jurnal Riset Komputer)
Latest Publications


TOTAL DOCUMENTS

67
(FIVE YEARS 67)

H-INDEX

0
(FIVE YEARS 0)

Published By STMIK Budi Darma

2715-7393, 2407-389x

2020 ◽  
Vol 7 (3) ◽  
pp. 403
Author(s):  
Rizky Hasanah Restari ◽  
Sinar Sinurat ◽  
Suginam Suginam

Health is one of the important factors for carrying out daily activities. However, some people do not care about the health of their bodies so that in the end many diseases that are diagnosed late cause the condition at a serious stage. One of the diseases in question is mononucleosis. In general, if the community is exposed to symptoms of mononucleosis, they will go to the nearest hospital or health center to do the examination. But on the other hand they have to sacrifice enough time for that. For this reason, it is necessary to make an application for a disease diagnosis expert system for the community as a means of overcoming these problems. With this design, an expert system of mononucleosis is produced, where this system uses the naive bayes method and the doctor's knowledge into the system. This expert system will produce output / output in the form of the diagnosis of mononucleosis


2020 ◽  
Vol 7 (3) ◽  
pp. 398
Author(s):  
Nurainun Hasanah Sinaga ◽  
Muhammad Syahrizal

SMS (Short Message Service) is a popular communication technology revolution. The development of computerized technology has been very advanced. SMS is very vulnerable to data theft or theft by irresponsible parties. For the sake of maintaining the security of SMS can be done by using cryptographic techniques. Cryptographic techniques can encode text messages by encrypting them into passwords that are not understood. Mars algorithm is an algorithm that uses a 128-bit key and the encryption process consists of 32 rounds. This symmetry algorithm will produce a higher level of security for the ultrasound image because it can encode it into a form of cipher with a process that is complex enough so that it will be difficult for cryptanalysts to access the image. This research will use the Mars algorithm for the encryption and decryption process, so the process needs to go through several long stages in order to produce the final cipher. This study describes the process of securing SMS by encoding it based on the Mars algorithm, in the form of a password that is difficult for others to understand and understand. This is done as an effort to minimize acts of misuse of SMS


2020 ◽  
Vol 7 (3) ◽  
pp. 432
Author(s):  
Windi Astuti

Various types of image processing that can be done by computers, such as improving image quality is one of the fields that is quite popular until now. Improving the quality of an image is necessary so that someone can observe the image clearly and in detail without any disturbance. An image can experience major disturbances or errors in an image such as the image of the screenshot is used as a sample. The results of the image from the screenshot have the smallest sharpness and smoothness of the image, so to get a better image is usually done enlargement of the image. After the screenshot results are obtained then, the next process is cropping the image and the image looks like there are disturbances such as visible blur and cracked. To get an enlarged image (Zooming image) by adding new pixels or points. This is done by the super resolution method, super resolution has three stages of completion, first Registration, Interpolation, and Reconstruction. For magnification done by linear interpolation and reconstruction using a median filter for image refinement. This method is expected to be able to solve the problem of improving image quality in image enlargement applications. This study discusses that the process carried out to implement image enlargement based on the super resolution method is then built by using R2013a matlab as an editor to edit programs


2020 ◽  
Vol 7 (3) ◽  
pp. 358
Author(s):  
Widodo Arif Prabowo ◽  
Mesran Mesran ◽  
Siti Nurhabibah Hutagalung

The development of the computer world in the current era, the need to secure messages / data and for security in communication is very important. The author conducted this research aims to secure chat messages from client to server and vice versa. With this cryptographic technique used to convert chat messages into the form of certain codes with the intention that chat messages cannot be seen / read by anyone except people who have the right to read the chat messages. In this study, the Client and Server Message Chat encoding application is designed which implements the workings of encryption and decryption using the Spritz Algorithm. The results of this study are chat client and server message encoding applications with the Spritz algorithm that can encode confidential chat messages. This application was created using Microsoft Visual Basic 2008


2020 ◽  
Vol 7 (3) ◽  
pp. 459
Author(s):  
Tirsa Ninia Lina ◽  
Belinda Sicilia Marlissa ◽  
Matheus Supriyanto Rumetna ◽  
Joseph Eliza Lopulalan

Oma Corry's business is a small-scale bread business in Sorong City, West Papua Province. One of the problems faced by Oma Corry Enterprises is the problem of calculating or determining the maximum profit gained every day from production activities. To calculate the benefits of Bread and Flour Bread and Babengka still use a calculator and write in books so it is less efficient. Whereas now the calculation of maximum profits must be completed quickly and precisely, so we need a system that can provide convenience in calculating profits. To achieve this goal, the simplex method is chosen for the manual calculation process and the POM-QM for Windows tool is used to speed up the calculation process. The result is a maximum profit of IDR 494,000 per day and a more efficient calculation process


2020 ◽  
Vol 7 (3) ◽  
pp. 353
Author(s):  
Syariah Kabeaken ◽  
Imam Saputra

The security of a file is a matter of concern in maintaining the confidentiality of information, especially those containing information that only the authorized parties may know about. Sending files or information without security will risk tapping and the information contained therein, can be easily known by unauthorized parties. One important thing in maintaining the confidentiality and security of files is the encryption process. Then based on techniques in cryptography, one of the methods that will be used in securing text files with the Spritz algorithm. Modern cryptography is more trusted by scientists than classical cryptography because it has a good level of security. Classical cryptography only does randomization from A-Z while modern cryptography operates in bit mode. The modern algorithm used is the Spritz algorithm. The Spritz algorithm is a variant of the RC4 algorithm, the security level of the Spritz algorithm is better than RC4


2020 ◽  
Vol 7 (3) ◽  
pp. 455
Author(s):  
Efidoren L Nainggolan ◽  
Muhammad Syahrizal ◽  
Saidi Ramadan Siregar

Canonical law is an internal church law governing the Catholic Church, Eastern Orthodox Church, Eastern Orthodox Church, Anglican Communion. How the laws of the church are governed, interpreted and sometimes examined differ fundamentally between the three church bodies. in all three traditions, a canon was originally a rule accepted by an assembly, these canons formed the basis for canon law. Raita algorithm is part of the exact string matching algorithm, which is matching the string exactly with the arrangement of characters in the matched string that has the same number or sequence of characters in the string. Matching strings on the raita algorithm is done through a shift from the right of the character then to the left of the character and to the middle of the character. The problem in this research is the content of canon law in general consists of a very large number of pages of books, this makes it difficult for canonical law users to find the contents needed, then in the search it takes time to find the contents of canonical law that are searched for too many search problems. that is, too much time must be needed to find the contents of the canonical law sought


2020 ◽  
Vol 7 (3) ◽  
pp. 421
Author(s):  
Sandrak A Batubara

The image of coffee beans is very important to recognize, with the image of coffee beans will make coffee lovers easier to recognize the coffee beans just by looking at their image without having to locate where the coffee grows. Coffee is a beverage known in Indonesia, the detection of coffee beans is very important because the number of seeds that are similar to coffee beans, so the process of detecting coffee beans is very necessary so that coffee beans can be identified, with the method of cany can detect real coffee beans. The cany method is a method that can detect coffee beans by recognizing the coffee beans.


2020 ◽  
Vol 7 (3) ◽  
pp. 415
Author(s):  
Sri Sugiarti ◽  
Berto Nadeak

A brand can reflect a product, but also has another dimension that is able to distinguish it from other products and is designed to meet the same needs. Digital cameras are devices for making images of objects for refraction through lenses on CCD sensors and more recently on BSI-CMOS (Back Side Illuminated) sensors that are more power efficient for more sophisticated cameras whose results are then recorded in digital format to in digital save media. The development of an era when someone more often captures his life's journey by expressing every activity into a photo using a digital camera because with that process can be done easily and good results for a photo that can capture the journey of one's life. With the increasing time of digital camera users more and more and digital camera brands are also increasingly sold in markets such as malls or shops, but to go to malls or shops will require transportation costs and not everyone has a free time to see new digital camera brands to the mall or shop because of its many work activities and other things. To overcome these problems the author builds an application that is the Implementation of the Zhu-Takaoka Algorithm in the Digital Camera Olshop Application. The zhu-takaoka algorithm is a string matching algorithm that can search words by shifting characters using 2 (two) dimensional arrays. The core process of searching for the zhu-takaoka algorithm is to search for words using the Right-to-left scan rule technique. Each shift in the word search process is determined by the shift values in the Good Suffix Shift Rule and Bad-Charcter Shift Rule tables. The expected results of this research are that it can help someone who wants to have a digital camera see or search for a digital camera brand using an Android application so that it can be done anywhere without having to go to the mall or shop.


2020 ◽  
Vol 7 (3) ◽  
pp. 409
Author(s):  
Saripah Aini

Data security is one of the most important aspects in information technology. With a high level of security, hopefully the information presented can be maintained its authenticity. In this final project a system that secures data and information stored on the computer from cryptanalysts is formed. The steps that the author did to make the process of forming the system include the stages of problem analysis, algorithm and flowchart along with modeling the structure of the program and design of the application interface, so that the application formed becomes easy to use and has optimal functions. By using TEA and pontifex algorithms which are secret key cryptographic algorithms, these problems can be overcome. The strength of this algorithm lies in the feistel network (including substitution operations, permutations and modular arithmetic) and delta numbers derived from the golden number.


Sign in / Sign up

Export Citation Format

Share Document