https://eurogeojournal.eu/ https://jurnal.pendidikanbiologiukaw.ac.id/
https://e-kerja.bnpp.go.id/bkp/https://journal.dkpp.go.id/wow/https://ppid.dkpp.go.id/_fungsi/dana/https://jurnal.pendidikanbiologiukaw.ac.id/https://e-kerja.bnpp.go.id/Pengawas/demo/https://jos.unsoed.ac.id/stats/2024/https://journal.umkendari.ac.id/dm/https://jurnal.radenfatah.ac.id/demo/https://journal.ar-raniry.ac.id/lap/https://sipeg.ui.ac.id/dm/https://e-kerja.bnpp.go.id/Pengawas/dana/
slot gacor 2025slot gacor 2025slot gacor 2025slot gacor 2025slot gacor 2025slot gacor
Analysis Of Database Record Compression Using The Levenstein Algorithm | Syahputra | The IJICS (International Journal of Informatics and Computer Science)

Analysis Of Database Record Compression Using The Levenstein Algorithm

Rian Syahputra

Abstract


Data stored in the database affects how much storage memory is used. The more data stored, the more memory will be used. To reduce memory usage it is necessary to reduce the data to be stored. The technique that can be used is data compression. Levenstein algorithm is a data compression technique that replaces the initial bits of the string, resulting in smaller compression. Levenstein algorithm is suitable for compressing data that has many repetitions.

Full Text:

PDF

References


S. D. Nasution, “PERANCANGAN APLIKASI KOMPRESI FILE TEKS DENGAN MENERAPKAN ALGORITMA GOLDBACH CODES,†J. Ilm. INFOTEK, vol. 1, no. 1, pp. 104–109, 2013.

S. D. Nasution and Mesran, “Goldbach Codes Algorithm for Text Compression,†IJournals Int. J. Softw. Hardw. Res. Eng., vol. 4, no. December, pp. 43–46, 2016.

E. Buulolo, “Sequitur Algorithm For Particular Character Compression Or Words Always Returned,†Int. J. Informatics Comput. Sci. (The IJICS), vol. 1, no. 1, pp. 15–17, 2017.

D. Salomon, D. Bryant, and G. Motta, Handbook of Data Compression (Google eBook), Fifth. Springer, 2010.

M. R. Irliansyah, S. D. Nasution, and K. Ulfa, “Penerapan Metode Deflate Dan Algoritma Goldbach Codes Dalam Kompresi File Teks,†KOMIK (Konferensi Nas. Teknol. Inf. dan Komputer), vol. 1, no. 1, pp. 186–189, 2017.

S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, “Data Security Using Vigenere Cipher and Goldbach Codes Algorithm,†Int. J. Eng. Res. Technol., vol. 6, no. 01, pp. 360–363, 2017.

T. P. Sari, S. D. Nasution, and R. K. Hondro, “Penerapan Algoritma Levenstein Pada Aplikasi Kompresi File Mp3,†KOMIK (Konferensi Nas. Teknol. Inf. dan Komputer), vol. 2, no. 1, 2018.




DOI: https://doi.org/10.30865/ijics.v3i1.1347

Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 Rian Syahputra

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.


The IJICS (International Journal of Informatics and Computer Science)
Published by Universitas Budi Darma.
Jl. Sisingamangaraja No.338 Simpang Limun, Medan, North Sumatera
Email: ijics.stmikbudidarma@gmail.com

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.