Artikel (97)
In this research, we develop The Application of Encoding and Decoding Tree Using The Dandelion Code. It aims to obtain Dandelion code of a tree using encoding and decoding. The encoding generates code from a tree, and decoding processes a code back into a tree. This application is developed to p...
Jurnal Komputasi; Vol. 3 No. 2 (2015) | 2016
Without no doubt, technology supports the human life and can be applied in many aspects, for example ineducation development. Learning process using computer as an aided tools are commonly used. The Applicationof Sequential Search Algorithm for The Searching Process of Information in The Learning Sy...
Jurnal Komputasi; Vol. 2 No. 2 (2014) | 2016
The national exam is a method of testing to education in Indonesia for determining students graduation in senior high school. The determine graduate base on the minimum value that must be obtained by students and established by the government. Students follow the simulated exam before faced the nati...
Jurnal Komputasi; Vol. 2 No. 2 (2014) | 2016
Science is the study of nature and its surroundings, including the flora and fauna. Flora are plants that live in a particular habitat or area, while the fauna are animals that live in a particular habitat or area. At the elementary school level, students learn about the introduction of flora and fa...
Jurnal Komputasi; Vol. 2 No. 2 (2014) | 2016
Markerless Augmented Reality (AR) is a term for an environment that combines real world and the virtual world, where objects in the real world can be recognized through the position, direction and location. Markerless AR technology can be used to interactively visualize information, especially when ...
Jurnal Komputasi; Vol. 2 No. 2 (2014) | 2016
Security is an important aspect in digital data transmission, and steganography is one way for hiding a secret message in such a way so that others are not aware of the existence of something in the message. In this research, we built a digital steganography system using web-based with Adaptive Mini...
Jurnal Komputasi; Vol. 2 No. 2 (2014) | 2016
Some muslims had so many reason not to learning Hadist, The statement and activity of Phophet Muhammad that used to guide the life of muslim. The objective of this research was to develop Android based application contains Hadist in Riyadhus Shalihin book vol. 2 by Imam Nawawi. In English Riyadhus S...
Jurnal Komputasi; Vol. 2 No. 2 (2014) | 2016
Tree Structure is used widely to represent problems in daily life, especially in computer science and technology. One method that is used to represent a tree is Blob Code. In this research, we developed an application to Encode and Decode Tree using Blob Code. This application aims to simplify the p...
Jurnal Komputasi; Vol. 2 No. 2 (2014) | 2016
The academic supervisor help collagers to finish their study well and efficient depends on their condition and potential. The allocation of academic supervisor in computer science major was done manually, Â it makes data processing become over late. This study, develop a web based system to help d...
Jurnal Komputasi; Vol. 2 No. 2 (2014) | 2016
Online attendance list is one of the new breakthroughs to record the list of attendees using computer technology and internet. In general, online attendance list is done by entering the username and password that have been registered in the system within the limited area. This research developed a w...
Jurnal Komputasi; Vol. 2 No. 2 (2014) | 2016