Claim Missing Document
Check
Articles

Found 5 Documents
Search

Hospital Performance Assessment Clustering in North Sumatra by using K-Means Algorithm Lumban Gaol, Adi Putra; Agustina Simangunsong
Login : Jurnal Teknologi Komputer Vol. 17 No. 02 (2023): Jurnal Teknologi Komputer, Edition Desember 2023
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58471/login.v17i02.79

Abstract

The hospital is an integral part of the entire health care system that serves patients with various types of services. The hospital assessment system is an effort to provide a tool that encourages the hospital to continuously improve the quality and safety of services. Thus the hospital must apply hospital accreditation standards, including other standards that apply to hospitals in accordance with the description in the Hospital Accreditation Standards. Data mining is a process of finding meaningful relationships, patterns, and trends by examining a large set of data stored in storage using pattern recognition techniques such as statistical and mathematical techniques.In this research the data mining algorithm used is the K-Means Clustering Algorithm. The simplest and most common method is because K-Means has the ability to classify large amounts of data in a relatively fast and efficient computation time.
Simulation of The Application of Intelligence in Vernam Cipher Cryptography (One Time Pad) Agustina Simangunsong; Simanjorang, R. Mahdalena
Login : Jurnal Teknologi Komputer Vol. 17 No. 02 (2023): Jurnal Teknologi Komputer, Edition Desember 2023
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58471/login.v17i02.85

Abstract

Technological advances in the field of computers allow thousands of people and computers around the world to be connected in one virtual world known as cyberspace or the Internet. But these technological advances are always accompanied by the downside of the technology itself. One of them is the vulnerability of data security, giving rise to challenges and demands for the availability of a data security system that is as sophisticated as the advancement of computer technology itself. In this study, an algorithm that can secure data will be used which the authors discuss is the Vernam Cipher Algorithm. Vernam Cipher Algorithm is one of the key algorithms. Until now, the Vernam Cipher algorithm is still trusted as an encryption method, Vernam Cipher cryptography uses the same key for encryption and decryption.
Hospital Performance Assessment Clustering in North Sumatra by using K-Means Algorithm Lumban Gaol, Adi Putra; Agustina Simangunsong
Login : Jurnal Teknologi Komputer Vol. 17 No. 02 (2023): Jurnal Teknologi Komputer, Edition Desember 2023
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58471/login.v17i02.79

Abstract

The hospital is an integral part of the entire health care system that serves patients with various types of services. The hospital assessment system is an effort to provide a tool that encourages the hospital to continuously improve the quality and safety of services. Thus the hospital must apply hospital accreditation standards, including other standards that apply to hospitals in accordance with the description in the Hospital Accreditation Standards. Data mining is a process of finding meaningful relationships, patterns, and trends by examining a large set of data stored in storage using pattern recognition techniques such as statistical and mathematical techniques.In this research the data mining algorithm used is the K-Means Clustering Algorithm. The simplest and most common method is because K-Means has the ability to classify large amounts of data in a relatively fast and efficient computation time.
Simulation of The Application of Intelligence in Vernam Cipher Cryptography (One Time Pad) Agustina Simangunsong; Simanjorang, R. Mahdalena
Login : Jurnal Teknologi Komputer Vol. 17 No. 02 (2023): Jurnal Teknologi Komputer, Edition Desember 2023
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58471/login.v17i02.85

Abstract

Technological advances in the field of computers allow thousands of people and computers around the world to be connected in one virtual world known as cyberspace or the Internet. But these technological advances are always accompanied by the downside of the technology itself. One of them is the vulnerability of data security, giving rise to challenges and demands for the availability of a data security system that is as sophisticated as the advancement of computer technology itself. In this study, an algorithm that can secure data will be used which the authors discuss is the Vernam Cipher Algorithm. Vernam Cipher Algorithm is one of the key algorithms. Until now, the Vernam Cipher algorithm is still trusted as an encryption method, Vernam Cipher cryptography uses the same key for encryption and decryption.
Implementation of Linear Congruent Method For Guess the Drawing Game Sinaga, Magdalena Sinaga; Agustina Simangunsong
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 1 (2021): March, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (532.022 KB) | DOI: 10.54209/infosains.v11i1.39

Abstract

In face guessing game is a game with pictures that will be scrambled and questions in this guess the face game application. Linear Congruent methods are used to generate random values used to randomize images and questions displayed on the guess the face game. Random value generation will be used in this game using lcm formula Xn = ( a (Xn-1) + b mod m. The constantly changing variable value in the game has a significant effect on the random value displayed. The ever-changing administration of a, Xn and b can avoid fixed or repetitive patterns of consecutive random value generation effects. In addition, the provision of variable changes can also prevent the repetition of questions that will be randomized in a row. While to avoid the exit of unwanted random values and used variable m as a limiter maximum value. The implementation of the above method can be concluded that the game guess the face of badminton athletes displays varied images and questions that users can play with their respective difficulty levels.