Claim Missing Document
Check
Articles

Found 11 Documents
Search

Application of Data Mining Correlation Between Family Socio-Economy And Student Achievement Level Sany Lubis, Fauzan Al An; Buaton, Relita; Sembiring, Hermansyah
Journal of Engineering, Technology and Computing (JETCom) Vol. 3 No. 1 (2024): JETCom (March 2024)
Publisher : Yayasan Bina Internusa Mabarindo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63893/jetcom.v3i1.141

Abstract

Learning achievement is the result of an achievement by students after going through the process of teaching and learning activities. Several factors influence student achievement, one of which is the family's socio-economic environmental factors. The family environment is very influential in the formation of children's character and also the child's mindset. The socio-economic level of the family has an influence on the success of children in achieving academic achievement. This study aims to determine the correlation between family socio-economic and student achievement at SMP Negeri 11 Binjai using the a priori method where this method helps the school and parents to more easily find out what factors are most dominant in influencing family socio-economic correlations to student achievement. From the 20 data tested, the best rule was obtained, namely if the parents of students with junior high school education worked as entrepreneurs and had an income of between IDR 1,000,000 - IDR 1,999,000. Then the student is not in the top 10 in his class with a supporting value of 10% and a certainty value of 100%
JARINGAN SYARAF TIRUAN MEMPREDIKSI KEBUTUHAN OBAT-OBATAN MENGGUNAKAN METODE BACKPROPAGATION Bangun, M. Zulhamdany; Novriyenni, Novriyenni; Sembiring, Hermansyah
Jurnal Sistem Informasi Kaputama (JSIK) Vol. 5 No. 1 (2021): Volume 5, Nomor 1, Januari 2021
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59697/jsik.v5i1.716

Abstract

Health development is directed at increasing awareness, willingness and ability to live for everyone so that the highest public health status can be realized. In the current era of regional autonomy where health development is the responsibility of the regional government, the regions must be able to regulate themselves, one of which is in fulfilling their drug needs. To fulfill the need for medicine, good processing and planning are needed. One of the facilities or facilities needed for optimal health services to the community is the need for support in the form of drug availability for basic health services to suit their needs. Backpropagation is a multilayer Artificial Neural Network training because the backpropagation method has three layers in the training process, namely the input layer, hidden layer and output layer, where backpropagation is the development of a single layer network (Single Screen Network) which has two layers, namely the input layer and output layer. The drug data used were 2010 to 2019. With a maximum epoch of 0-10000, learning rate 0.1 and target errors ranging from 0.01 to 0.003 to produce convergent results. The results of the prediction of the number of drugs after carrying out the training process and testing have increased and decreased.
Watermarking Qr Code Application On Birth Certificates Using The Discrete Cosine Transform (Dct) Method Firliansyah, Aulia; Fauzi, Achmad; Sembiring, Hermansyah
Indonesian Journal of Education And Computer Science Vol. 1 No. 2 (2023): INDOTECH - August 2023
Publisher : PT. INOVASI TEKNOLOGI KOMPUTER

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60076/indotech.v1i2.46

Abstract

The current era's development directs us to understand data security better. Vital documents such as family cards often become subjects of forgery. Therefore, we must be capable of safeguarding the confidentiality of our data. This issue can be addressed through watermarking methods. Watermarking is a technique that can be used to embed information into an image. A digital image represents a machine-captured approximation of an image based on sampling and quantization. The image utilized here employs QR Code, which represents the evolution of one-dimensional barcodes into two-dimensional forms. This study employs the Discrete Cosine Transform (DCT) algorithm. This algorithm converts data from spatial form by segmenting images into sub-parts with varying frequencies. The application of the Discrete Cosine Transform (DCT) method in watermarking the QR Code on birth certificates has significantly contributed to the security and authentication of the document. Throughout this implementation, DCT has proven to be an effective tool for embedding additional information into birth certificate images without compromising the integrity of the main information. However, it should be noted that the use of DCT can also impact the visual quality of the image. Thus, parameter adjustments are necessary to strike the right balance between security and visual aesthetics.
Internet-Based Smart Door Design of Things (IOT) with Visitor Access Controller Indoor Nurmuhlisa; Fauzi, Achmad; Sembiring, Hermansyah
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.566

Abstract

In the era of digital technology, the Internet of Things (IoT) has become an innovative solution in various sectors, including in access management and room security. This research aims to design and implement an IoT-based smart door system that is able to control visitor access using NodeMCU ESP8266 and send notifications through the Telegram application. The system uses PIR sensors to detect the presence of visitors and servo motors to operate the door automatically. When the number of visitors reaches the maximum set capacity, the system will automatically close the door and send a warning notification to the Telegram bot and activate the buzzer as a warning sign. Thus, this system not only improves the safety and comfort of visitors, but also helps prevent the spread of diseases by limiting the number of visitors according to a safe capacity. The test results show that this smart door system can function well in controlling visitor access and providing real-time notifications when the room capacity is exceeded. The implementation of this system is expected to be applied in various public places to improve security management and visitor capacity effectively.
Design of a Guest Face Detection Tool Using ESP32-CAM Based on Internet of Things (IoT) Khadafi, Muhamad; Pardede, A M H; Sembiring, Hermansyah
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.578

Abstract

This research develops an Internet of Things (IoT)-based guest face detection tool using ESP32-CAM to create a digital guestbook archive. The device distinguishes between guests and employees, with employee face data stored in a GitHub repository. When the device detects an unfamiliar guest face, a notification and photo are sent to a Telegram bot. If an employee's face is detected, a notification of the employee's name is sent to the Telegram bot. The method used is prototyping and the test results show that this tool is effective in detecting and digitally archiving guest visits.
Clustering Students Level of Understanding of Programming Language Courses Using the K-Means Algorithm Ramadana, Noval; Yani Maulita; Sembiring, Hermansyah
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.650

Abstract

This study aims to categorize students based on their level of understanding of programming language courses using the K-Means algorithm. Students often experience difficulties in understanding the basic concepts of programming languages, which can affect their ability to solve programming problems. Using data obtained from questionnaires filled out by STMIK Kaputama Binjai students, this study analyzed variables such as attendance rate, learning interest, and level of understanding. The analysis results show the existence of patterns and relationships between these variables, which can be used to identify groups of students who have a good, poor, or no understanding of the course. This research is expected to provide input for educational institutions in designing learning strategies that are more effective and attractive to students.
THE DESIGN OF GAS STATION TERMINAL SEARCH APPLICATION BY APPLYING THE METHOD OF TRAVELING SALESMAN PROBLEM Dimastara, Rafa; Manurung, Hotler; Sembiring, Hermansyah
Journal of Mathematics and Technology (MATECH) Vol. 3 No. 1 (2024): Journal MATECH (May 2024)
Publisher : Yayasan Bina Internusa Mabarindo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63893/matech.v3i1.169

Abstract

The increasing need for transportation is unavoidable. Moreover, the ability of the community to obtain or use transportation is increasing due to the increasing income of the community. The number of means of transportation makes the density of existing highways so that sometimes the streets often run out of fuel because they do not know the location of the nearest fuel filling. General fuel filling station (SPBU) is a distribution institution built on a plot of land and has a gas station facility with a design, design, and technical specifications that have been approved by Pertamina. Gas stations are used to distribute and market fuel and or other products using Pertamina trademarks and can be used for NFR (Non Fuel Retail) business management. If the transportation equipment runs out of fuel, of course, immediately look for the nearest gas station from the location of the rider. If the distance is far from the location, he will push his vehicle until he finds the Pertamina gas station signboard, the farther the distance the location, the vehicle will definitely be tired to push it. Seeing from the many means of Transportation circulating on the streets, the author wants to create a system application that can find out the location of the nearest Pertamina gas station using the application. Users who use the application just need to run the application and search for the nearest Pertamina gas station from its location to be faster in the process of searching for Pertamina gas stations to refuel. So that users who will run out of fuel can go directly to the location to refuel at the nearest Pertamina gas station from their location.
Jaringan Syaraf Tiruan Memprediksi Tingkat Penggunaan Sosial Media Dimasa Pandemi Menggunakan Metode Backpropagation Naufal, Tengku Akhdan; Sembiring, Arnes; Sembiring, Hermansyah
Educativo: Jurnal Pendidikan Vol 1 No 1 (2022): Jurnal Teknik, Komputer, Agroteknologi dan Sains (Marostek)
Publisher : PT. Marosk Zada Cemerlang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (633.163 KB) | DOI: 10.56248/marostek.v1i1.19

Abstract

Media sosial merupakan sebuah media online di mana para penggunanya dapat dengan bebas dan mudah berbagi serta menciptakan isi pesan yang diinginkan. Media sosial juga sebagai tempat untuk membagi kegiatan atau aktifitas pengguna. Pengguna juga tidak dirumitkan dalam pembuatan media sosial dan tidak ada batasan ruang dan waktu di mana pengguna dapat membuka media sosal dalam waktu 24 jam sehingga memberikan kecanduan bagi para pengguna media sosial. Saat ini penggunaan media sosial menjadi salah satu alat komunikasi berbasis online untuk mencegah terjadinya penyebaran covid-19 dan kerumunan masyarakat. Alat komunikasi yang saat ini banyak digunakan oleh masyarakat setempat adalah handphone dan laptop serta harus tersedia juga jaringan internet agar dapat mengakses pekerjaan dan sebagai media pembelajaran online pada saat ini. Oleh karena itu perlu adanya suatu tindakan untuk memprediksi tingkat penggunaan sosial media apa saja yang digunakan oleh masyarakat dan pelajar saat ini agar nantinya dapat mempermudah dan menjadi rekomendasi terbaru dalam hal memberikan informasi dan lainnya dengan cepat. Dari analisa yang dilakukan dapatlah hasil pengguna untuk seluruh proses yang dilakukan yaitu pengguna facebook pada bulan juni 45 data, pengguna instagram pada bulan Juni 45 data, pengguna tiktok pada bulan Juni 74 data, pengguna whatsapp pada bulan Juni 45 data, pengguna youtube pada bulan Juni 45 data.
Pendaftaran Mahasiswa Baru Sekolah Tinggi Ilmu Kesehatan Columbia Asia berbasis WEB Batubara, Muhammad Iqbal; Sembiring, Hermansyah; Harefa, Naomi Kristiani Putri
KAKIFIKOM : Kumpulan Artikel Karya Ilmiah Fakultas Ilmu Komputer Volume 6 Nomor 1 Tahun 2024
Publisher : UNIKA Santo Thomas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54367/kakifikom.v6i1.3973

Abstract

The application is built using the waterfall method, in developing the System Development Life Cycle (SDLC) which is a general methodology in system development that marks the progress and efforts of analysis and design starting with data collection through observation and interviews, system needs analysis to eval_uation based on system testing. The Design of a Web-Based New Student Registration Information System at Columbia Asia Health College is expected to make it easier for prospective new students to register by saving time and money compared to coming directly to campus and with this system students can get all information about new student admissions through the website. And also this information system is expected to help and facilitate the processing of student data at Columbia Asia Health College.
Penerapan Algoritma Secure Hash Algorithm (SHA) Keamanan Pada Citra Sembiring, Hermansyah; Manik, Fuzy Yustika; Zaidah, Tengku
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (533.186 KB) | DOI: 10.54367/means.v4i1.316

Abstract

Current information exchange is not only in the form of text, it can be an image or video. All of that can be done using computer network technology in the form of the internet. Through an internet connection, you can connect with many people. Cryptography aims for messages or images that cannot be seen by other parties who have no interest in the information. Messages or secured images can be data stored in secure computer memory or sent through computer networks. And can protect the confidentiality of images from various threats that arise. To maintain data security, SHA-256 is used when transforming data bytes into string hashes. The system built has been able to implement the SHA 256 algorithm which can change the original image file in the form of unknown files and encrypted images that are difficult to know the original image, unless read using an application that has been built. the image when encrypted and used again at the time of decryption with as many as 45 characters and may be in the form of numbers or letters. The SHA 256 process when encrypted in only one round, can be played with decryption.