Claim Missing Document
Check
Articles

Found 33 Documents
Search

Implementasi Algoritma Dijkstra Dalam Pembuatan Aplikasi Pesona Palu Anshori, Yusuf; Joefrie, Yuri Yudhaswana; Nadyanti, Nadyanti
ScientiCO : Computer Science and Informatics Journal Vol 1, No 1 (2018): Scientico : April
Publisher : Fakultas Teknik, Universitas Tadulako

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study aims to build application that is able to provide information on the location of culinary tourism, shopping and recreation center for the area of Palu City that runs on the Android platform and able to show the closest path to be traversed in order to help tourists or newcomers who are not too familiar with the city of Palu. Determination of the shortest route in this application using Dijkstra algorithm. This algorithm is used to find the shortest path on a directed graph. This algorithm uses the Greedy principle which states that at each step we choose the minimum-weighted side and put it into the solution set.
STUDI KOMPARASI METODE WEIGHT PRODUCT DAN SIMPLE ADDITIVE WEIGHTING DALAM SISTEM PEMILIHAN ALAT KONTRASEPSI BERBASIS WEB Pangara, Takdir S; Anshori, Yusuf; Amriana, Amriana
ScientiCO : Computer Science and Informatics Journal Vol 4, No 1 (2021): Scientico : April
Publisher : Fakultas Teknik, Universitas Tadulako

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Controlling birth is closely related to the use of contraceptives for their partners. However, the problem they often face is that they struggle to choose an effective contraceptive that suits their body condition. This is not only caused by the limited methods available but also because they do not know the requirements and safety of these contraceptive methods. This study aims to implement and analyze the comparison of the Weight Product (WP) method and the Simple Additive Weighting (SAW) method in a web-based contraceptive selection decision-making system. This system can work well in determining the right contraception for a married couple. In the time testing process, the implementation of the SAW method has an average execution time of 1.8784 s while the WP method has an average execution time of 0.3340 s. Based on the research results, the WP method is slightly faster than the SAW method in carrying out the calculation process in the decision support system for the selection of contraceptives. 
Implementasi Algoritma Kriptografi Rivest Shamir Adleman (RSA) pada Tanda Tangan Digital Yusuf Anshori; A. Y. Erwin Dodu; Dewa Made P. Wedananta
Techno.Com Vol 18, No 2 (2019): Mei 2019
Publisher : LPPM Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (669.949 KB) | DOI: 10.33633/tc.v18i2.2166

Abstract

Tanda tangan digital merupakan mekanisme otentikasi yang memungkinkan pembuat pesan menambahkan sebuah kode yang bertindak sebagai tanda tangannya. Tanda tangan digital dapat digunakan untuk melakukan pembuktian secara matematis bahwa data tidak mengalamai modifikasi secara illegal, sehingga bisa digunakan sebagai salah satu solusi untuk melakukan verifikasi data. Penelitian ini bertujuan untuk menerapkan algoritma kriptografi Rivest Shamir Adleman (RSA) pada tanda tangan digital. Proses pembuatan tanda tangan digital diawali dengan pembuatan message digest dari sebuah dokumen kemudian proses pembangkitan kunci publik dan kunci privat untuk mengamankan data dan untuk membuat tanda tangan digital. Kunci privat akan dikirimkan kepada penerima pesan untuk memverifikasi tanda tangan digital. Tanda tangan digital dan dokumen dikirmkan kepada penerima. Selanjutnya, pada proses verifikasi, penerima akan mengecek apakah tanda tangan tersebut cocok atau tidak dengan menggunakan kunci privat dan menghitung nilai hash (message digest) dari dokumen yang diterima.
Perancangan Robot Penelusur Menggunakan Algoritma Dijkstra dan Metode Maze Solver Yusuf Anshori; A. Y. Erwin Dodu; Fadli Kurniawan
Techno.Com Vol 18, No 2 (2019): Mei 2019
Publisher : LPPM Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (770.859 KB) | DOI: 10.33633/tc.v18i2.2335

Abstract

Dalam sebuah eksplorasi terdapat berbagai macam hal yang ingin di telusuri, baik dalam area terbuka maupun sebuah area tertutup. Pada area tertutup seperti reruntuhan, banyak hal yang bisa terjadi dan dapat membingungkan serta membahayakan nyawa manusia. Berdasarkan studi literatur yang dilakukan didapatkan bahwa dengan menggunakan robot yang diimplementasikan algoritma dijkstra dan metode maze solver dapat mengurangi biaya eksplorasi serta menghindari hal-hal yang dapat membahayakan nyawa manusia. Maka untuk algoritma dijkstra dan metode maze solver diambil dikarenakan algoritma dijkstra dapat menelusuri jalur terpendek dari titik manapun dan metode maze solver dapat menelusuri labirin yang tidak diketahui peta labirinnya sehingga dapat melakukan penelesuran labirin yang memiliki peta yang diketahui jalurnya dan peta yang tidak diketahui jalurnya. Capaian dari hasil penelitian ini adalah, mengimplementasikan algoritma dijkstra dan metode maze solver pada robot penelusur labirin. Ilmu penelitian ini dapat menjadi referensi dari studi pembelajaran dan pembuatan produk teknologi yang berguna bagi perusahaan maupun masyarakat.
PENDEKATAN TRIANGULAR FUZZY NUMBER DALAM METODE ANALYTIC HIERARCHY PROCESS Yusuf Anshori
Foristek Vol. 2 No. 1 (2012): Foristek
Publisher : Foristek

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The study aims to design decision support system using triangular fuzzy number approach in Analytic Hierarchy Process method. The Analytic Hierarchy Process (AHP) is one of the decision support system method which controls experiences and intuition but critical at coupled comparative scales because it uses crisp. A triangular fuzzy number is used to approach AHP scale so as to obtain more fexible value of coupled comparison. The triangular fuzzy number-AHP method uses analysissynthetic extent in the priority processing implemented on ranking cases of potential acceptors of scholarship of PPA and BBM in Technic Faculty Tadulako University of Palu. The result is the average of mismatch between the result by triangular fuzzynumber-AHP method and the result of manual work which are 23.93% of the PPA scholarship and 27,35% of the BBM scholarship.
PROTOTYPE SISTEM KATALOG BUKU ONLINE MENGGUNAKAN TEKNOLOGI JAVA DAN XML UNTUK PERANGKAT SELULER Yusuf Anshori
Foristek Vol. 2 No. 2 (2012): Foristek
Publisher : Foristek

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Libraries as providers of information that is generally in the form of print media (books, reports, magazines, newspapers, journals, etc.) should gradually improve its services so that remain attractive to the visitors. One of the service improvements that can be done is to provide an information catalog that can be accessed by telecommunications media such as mobilephone and smart phone. This paper aims to create a prototype of the online book catalog system software using Java and XMLtechnology and use wireless networking technology from the hardware catalog of books that can be accessed by cellular telephone communication media in particular. By inspecting the testing results conducted in this study known that the catalog is accessible for cellular phones from various vendors.
Implementasi Algoritma Luc Pada Aplikasi Keamanan Short Message Service (SMS) Berbasis Android Yusuf Anshori; Deny Wiria Nugraha; Arief Pratomo
CESS (Journal of Computer Engineering, System and Science) Vol 6, No 1 (2021): Januari 2021
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (752.477 KB) | DOI: 10.24114/cess.v6i1.21862

Abstract

Short Message Service (SMS) still has security problems with attempts to steal messages, intercept messages, hijack messages by parties who are not responsible for obtaining information. Cryptography is the science of maintaining the confidentiality of information from aspects that can threaten information security with certain mathematical algorithms and techniques. The Luc algorithm is a public key cryptographic algorithm that was developed using the lucas function. This study aims to implement the Luc algorithm on an Android-based SMS security application in the National Narcotics Agency of Central Sulawesi Province to maintain privacy in communication between the sender and recipient of the message. This application was created using an Android studio developer with the Java programming language. Based on the results of the first test for a sample of plain messages in the word KOTA PALU that uses public key 13 produces the message cipher P=Se!CQa. The second test result for the message sample on the word KOTA PALU that uses public key 29 generates the AD*`_$(NQ cipher message
PENGENDALIAN SISTEM PENCUCI DAN PENGERING TANGAN OTOMATIS MENGGUNAKAN SENSOR PASSIVE INFRA RED (PIR) Taufik Rahman; Deny Wiria Nugraha; Yusuf Anshori
-
Publisher : MEKTRIK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Washer and dryer hand automatic system is one of the few applications of control systems. Research on control system washer and dryer hand automatic is aimed to know the working principle and how to implement sensors Passive Infra Red (PIR) as detection sensors, microcontroller ATMega32 as the main controller and Selenoid Valve, Dryer and Liquid Crystal Display (LCD) as an output device into a system that can be controlled automatically so that the activities of hand washing and drying can be done easily and practically. This research conducted with qualitative methods based on experiment which will be designed a washing system and automatic hand dryer using a PIR sensor-based microcontroller ATMega32. Washer and dryer hand automated system operate based on reaction Passive Infra Red sensor (PIR) on the human body, namely the hands of users. If one of the three mode buttons have been pressed and the user's hand is detected by the PIR sensors located around the faucet then the sensor will provide a response to the microcontroller to manage the data that will instruct the output device to work automatically.
Aplikasi Steganografi pada Media Citra Digital Menggunakan Metode Least Significant Bit (LSB) Yusuf Anshori; A.Y. Erwin Dodu; Megawati Purwaningsih
SATIN - Sains dan Teknologi Informasi Vol 5 No 1 (2019): SATIN - Sains dan Teknologi Informasi
Publisher : STMIK Amik Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (596.758 KB) | DOI: 10.33372/stn.v5i1.435

Abstract

Untuk dapat melakukan proses pengiriman pesan biasanya dibutuhkan suatu cara untuk menjaga keamanan pesan tersebut, agar pesan tidak mudah di ketahui oleh orang lain. Salah satu teknik untuk menyembunyikan pesan yaitu steganografi. Steganografi merupakan ilmu dan seni yang mempelajari teknik dan cara penyembunyian pesan rahasia kedalam suatu media sedemikian rupa sehingga pihak ketiga tidak dapat melihat dan menyadari keberadaan pesan rahasia tersebut. Pada penelitian ini membahas mengenai bagaimana metode least significant bit dapat digunakan untuk menyembunyikan pesan ke dalam file citra. Untuk jenis pesan yang dapat disembunyikan berupa pesan teks, pesan gambar dan pesan dokumen yang di ekstrak kedalam bentuk rar. Metode LSB mengganti bit-bit data RGB citra yang paling kanan dengan bit-bit data pesan rahasia. Metode penelitian yang digunakan adalah waterfall model. Berdasarkan pengujian yang dilakukan metode LSB dapat digunakan untuk menyembunyikan pesan tanpa membuat perubahan dari segi bentuk maupun ukuran pesan rahasia yang disembunyikan juga dapat diekstrak kembali tanpa mengalami kerusakan.
Serli Discovery Learning Dalam Mendukung Pembelajaran Ilmu Pengetahuan Alam Siswa Berbasis Android: Serli Discovery Learning in Supporting Android-Based Natural Science Learning for Students Putri Febrina, Annisa; Ngemba, Hajra Rasmita; Hendra, Syaiful; Anshori, Yusuf; Azizah, Azizah
Technomedia Journal Vol 9 No 1 Juni (2024): TMJ (Technomedia Journal)
Publisher : Pandawan Incorporation, Alphabet Incubator Universitas Raharja

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33050/tmj.v9i1.2219

Abstract

The development of information technology, have a positive impact on education by providing flexible learning support. The design and presentation of the learning tool significantly affect students' interest in learning. In the current technological era, students and teachers must consider the accessibility and mobility of learning media. The purpose of this research is to develop the SERLI Application, an android-based Natural Science learning module that can be accessed anywhere by students and teachers. The application development model used is the Hannafin & Peck Model, which consists of  needs analysis,  design  stages, and  implementation & development. The method for evaluating user satisfaction uses the End User Computing Satisfaction method. This method considers variables such as content, accuracy, display format, ease of use, and timeliness. The experts tested the SERLI Application, gave a 86.58% success rate. Student users and teachers also evaluated the application and achieved a 85% success rate. These results are very good. The implementation result of this research is an android-based learning application product that contains a science lesson module. In this application, there is an initial display, namely registration into the application, then the main display of the application which contains modules and practice questions, then the display for the teacher.