https://journal.grahamitra.id/index.php/jutik/issue/feed Jurnal Kajian Ilmiah Teknologi Informasi dan Komputer 2025-01-10T03:42:09+00:00 Soeb Aripin jurnal.jutik@gmail.com Open Journal Systems <p align="justify"><strong>Jurnal Kajian Ilmiah Teknologi Informasi dan Komputer</strong>, merupakan jurnal ilmiah yang memuat kajian-kajian ilmiah penerapan Sains, ilmu komputer dan Teknologi Informasi pada kehidupan masyarakat. Jurnal Sains dan Teknologi Informasi memiliki ISSN <a href="https://issn.brin.go.id/terbit/detail/20221210411323606" target="_blank" rel="noopener"><strong>2962-9055 (media online)</strong></a>, sesuai dengan SK Nomor:29629055/II.7.4/SK.ISSN/12/2022. Jurnal Kajian Ilmiah Teknologi Informasi Dan Komputer terbit 2 bulanan, yaitu pada November (Nomor 1), May (Nomor 2).&nbsp;&nbsp;</p> <p align="justify">Jurnal Kajian Ilmiah Teknologi Informasi dan Komputer, terakreditasi SINTA Peringkat 5 berdasarkan Surat Keputusan peringkat Akreditasi Periode 2 Tahun 2025, dari Surat Keputusan Direktur Jenderal Riset dan Pengembangan No: <a title="SK Akreditasi Jurnal" href="https://drive.google.com/file/d/1woicPi7uYdMh3Fv15RDpd-i-9Gsl6Iw2/view?usp=sharing" target="_blank" rel="noopener">156/C/C3/KPT/2026</a> tanggal 7 April 2026</p> https://journal.grahamitra.id/index.php/jutik/article/view/134 Perancangan Aplikasi Pembangkit Identitas File Dokumen Menerapkan Algoritma Fungsi HASH MD2 2025-01-10T03:40:13+00:00 Suriani Ndruru surianinduru732@gmail.com <p>Currently in the digital world era. However, now many industries have switched to digital technology such as photos, videos, music and so on. Of course, this change brings many benefits to us in terms of data access speed. Another advantage of computer technology is in terms of copying and generating digital file identities where the results will have the same identity value. So if you want to distinguish one document file from another, it will be very difficult because you have to check the entire contents of the document file. In cryptography there is a hash function which is a one-way function that can generate the identity of a file. Where if the document file has the same contents, it will produce the same hash value. This can be used to identify the same document file. In the hash function there is an MD2 method or the design of a document file identity generator application applies the MD2 hash function algorithm which is one of the hashing algorithms that is often used to encrypt data with a width of 20 bytes or 160 bits. By applying this algorithm to the identity document application, the results of the document file search are grouped based on the same hash value and users can easily and quickly delete document files with the same identity without having to open and read the contents of the file.</p> 2024-11-30T00:00:00+00:00 ##submission.copyrightStatement## https://journal.grahamitra.id/index.php/jutik/article/view/159 Analisa Kemudahan Penggunaan Aplikasi AdaKami Dengan Menerapkan Metode Technology Acceptance Model (TAM) 2025-01-10T03:40:42+00:00 Julia Indriani Lubis juliaindrianilubis16@gmail.com Rizky Anggraini Siregar rizkyanggraini615@gmail.com <p><em>The problem in this research is that the AdaKami application often gets complaints from users, such as not being able to use or withdraw money even though the limit is high, difficulties in the application where errors often occur in the payment system, and users are subject to fines for late payments. To overcome these problems, research This method uses the Technology Acceptance Model (TAM) to analyze the ease of the AdaKami application. With this article, users can understand how to use the AdaKami application. We hope that the data collection carried out can help users use the features contained in the application. Overall, the PEAOU variable is included in the strongly agree category and it can be concluded that using the AdaKami application is relatively easy. With the results obtained by the PEOU variable of 68.4%.</em></p> 2024-11-30T00:00:00+00:00 ##submission.copyrightStatement## https://journal.grahamitra.id/index.php/jutik/article/view/160 Implementasi Metode WASPAS Dalam Penilaian Kinerja ASN Dengan Pembobotan Menggunakan Metode ROC 2025-01-10T03:41:12+00:00 Raihan Dwi Arya raihandwiarya12@gmail.com Rian Ardiansyah rianardnsyh17@gmail.com <p>It is very important to assess ASN performance for resource management because it can be used for decision making in a policy. The aim of this research is to create a Decesion Support System for assessing ASN perfoance using the WASPAS method and ROC weighting. ASN performance assessments are carried out using methods based on assessing attendance and punctuality, so that the assessment process is still considered to be less effective in determining performance assessments. The result form the calculation of the highest ASN performance assessment were obtained by no.2 with a final score of 0.958 and ranked 1<sup>st</sup> in the ranking and no.1 hot the lowest score with a final score 0.906 and ranked 5<sup>th</sup>.</p> 2024-11-30T00:00:00+00:00 ##submission.copyrightStatement## https://journal.grahamitra.id/index.php/jutik/article/view/161 Implementasi Algoritma Additive Code Untuk Mengkompresi File PDF Pada Aplikasi E-Archive 2025-01-10T03:41:33+00:00 Fitri Ayu Ningsih fitriayuningsih456@gmail.com <p>Problems with the need for storage space in the E-Archive application is one of the main problems that can affect the performance of own E-Archive application. This is due to the large number of PDF files large files stored in the E-Archive application database. One of solutions that can be done to overcome this problem are compress PDF files. The compression process in this study was carried out based on an algorithm Additive Code. Based on the results of the tests performed, the Ratio of Compression (RC) of 1.33, Compression ratio (Cr) reduced by as much 75%, Redundancy (Rd) is reduced by 25% and Space saving (Ss) is reduced as much as 25%. The results show that the need for storage space the E-Archive application database is more optimal than before the process was implemented compression.</p> 2024-11-30T00:00:00+00:00 ##submission.copyrightStatement## https://journal.grahamitra.id/index.php/jutik/article/view/166 Sistem Pendukung Keputusan Untuk Penentuan Rumah Tidak Layak Huni Di Desa Lubuk Besar Kecamatan Datuk Lima Puluh Dengan Menggunakan Metode MOORA 2025-01-10T03:41:43+00:00 Licha Aygisella lichaaygisella24@gmail.com <p>Pneumonia Assistance for uninhabitable houses (RTLH) is a problem that is of serious concern to the government of Lubuk Besar Village. At the Lubuk Besar Village Office, which still uses a manual method in determining recipients of uninhabitable housing assistance, data processing has not been computerized. This assistance is obtained if the prospective beneficiary is deemed to meet the requirements and criteria that have been determined, for example: the floor is still dirt, the walls are still bamboo, the roof structure is still thatch, the land area and so on. However, the existence of problems in determining the assistance made it difficult for the selection of prospective recipients of house renovation assistance. One solution to this problem is to use a Decision Support System (SPK) that can assist the Lubuk Besar Village Office in making decisions about determining recipients of uninhabitable housing assistance (RTLH) so that they are right on target. The MOORA method is a method that optimizes many objectives based on ratio analysis. the way this method works is to determine the ranking quickly and on target and to find out the highest to lowest scores in a selection for determining uninhabitable houses in Lubuk Besar Village, Datuk Lima Puluh District</p> 2024-11-30T00:00:00+00:00 ##submission.copyrightStatement##