Claim Missing Document
Check
Articles

Found 5 Documents
Search

Development of Android-Based Smart System for Gingivitis Diagnosis Using Certainty Factor Hadistio, Ryan Rinaldi; Simamora, Windi Saputri; Muis, Abdul
Sinkron : jurnal dan penelitian teknik informatika Vol. 8 No. 1 (2024): Articles Research Volume 8 Issue 1, January 2024
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v9i1.13361

Abstract

Gingivitis is a gum disease that causes bleeding, swelling, redness, discharge, changes in normal contours, and although health authorities take this seriously, sometimes some patients consider it normal. This study aims to educate the public about the importance of understanding the condition of their bodies, especially the most vulnerable teeth. Lack of time to consult an expert leads to this disease being neglected. Therefore, it is necessary to develop a consultation application in the form of an expert system. The built system adopts the deterministic factor method. The certainty factor works by reading the entire data submitted by the expert and giving the result as a percentage of confidence that the patient has gingivitis. The experts used in this system are dental experts. Data obtained from direct experts and consultations resulted in new knowledge in the form of the percentage of trust patients suffering from gingivitis. The data collected are symptoms and solutions obtained from experts. This research provides a new service for patients suffering from gingivitis without the need to see a specialist directly. Based on the testing data provided to the patient and based on the patient's condition at that time, the test results of the system reached a confidence level of 98.74%. So that the results of consultation are obtained in the form of information about the disease and the solutions needed.
Edukasi Kesadaran Keamanan Data/Informasi dan Bermedia Digital pada Siswa/i SMA Kemala Bhayangkari Medan Simamora, Windi Saputri; Harahap, Siti Sarah; Hadistio, Ryan Rinaldi
ULEAD : Jurnal E-Pengabdian Volume 3 Nomor 1 Juli 2023
Publisher : Fakultas Ilmu Komputer, Universitas Katolik Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54367/ulead.v3i1.2797

Abstract

Dalam dunia digital yang semakin kompleks, penting bagi siswa/i untuk memiliki pemahaman yang baik tentang risiko-risiko yang terkait dengan penggunaan teknologi informasi dan media digital. Melalui penyuluhan dan workshop, siswa/i akan mendapatkan pemahaman praktis dan keterampilan dalam menghadapi risiko-risiko terkait keamanan data/informasi dan bermedia digital. Materi yang disampaikan meliputi pencurian identitas, penipuan online, privasi online, penipuan phishing, perbankan online, virus, tipuan email, dan praktik penggunaan internet yang aman. Selain itu, forum diskusi juga akan memberikan kesempatan bagi siswa/i untuk berdiskusi dan berbagi pandangan terkait keamanan data/informasi dan bermedia digital. Dengan menerapkan solusi-solusi tersebut, diharapkan siswa/i SMA akan memiliki pemahaman yang lebih baik tentang keamanan data/informasi dan bermedia digital. Mereka akan menjadi pengguna yang lebih bertanggung jawab dan cerdas dalam menghadapi risiko-risiko di dunia maya. Selain itu, kegiatan ini juga akan memberikan dampak positif yang luas dalam menciptakan lingkungan belajar yang aman dan produktif.
Implementation of Fuzzy Logic in Detecting Air Temperature Based on Microcontroller Harahap, Siti Sarah; Simamora, Windi Saputri; Hadistio, Ryan Rinaldi
Brilliance: Research of Artificial Intelligence Vol. 3 No. 2 (2023): Brilliance: Research of Artificial Intelligence, Article Research November 2023
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v3i2.3023

Abstract

The environment, technology, and many facets of daily living are all significantly impacted by temperature conditions. Knowing environmental health, agriculture, industry, electrical technology, weather and natural disasters, transportation, and even scientific research are just a few of the many reasons why temperature conditions are crucial. Fuzzy algorithms are used to more flexibly process temperature data while creating a temperature detector employing fuzzy logic. We can base our conclusions on a wider range of criteria than merely right or wrong thanks to fuzzy logic. A temperature sensor, microprocessor, and display (such an LCD or LED screen) are some basic electronic components that can be used to create a temperature detector.
Analysis of the Multi Objective Optimization by Ratio Analysis (MOORA) Method in Determining Pilot Areas at PT. XYZ Simamora, Windi Saputri; Harahap, Siti Sarah; Idaman, Akbar; Simatupang, Septian
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 3 (2024): Articles Research Volume 6 Issue 3, July 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i3.4149

Abstract

This research analyzes the application of the Multi Objective Optimization by Ratio Analysis (MOORA) method model in determining the Pilot Area at PT XYZ. This method is used to evaluate various performance criteria, including customer satisfaction, productivity, service quality, and operational efficiency. Currently, the Pilot Area assessment and selection process at PT XYZ is still done manually, which causes a lack of accuracy and efficiency. MOORA was chosen for its ability to handle multi-criteria decision-making problems more systematically and objectively. The analysis results showed that Alternative Area 7 obtained the highest final score of 0.39, placing it as an area with superior performance. The application of MOORA is proven to improve accuracy and efficiency in the Pilot Area determination process, providing a more objective basis for decision-making. By using MOORA, PT XYZ can evaluate area performance more comprehensively and accountably. This research recommends that PT XYZ implement the MOORA method thoroughly and conduct periodic evaluations of the methods used. For theory development, PT XYZ can add specific evaluation criteria according to company needs. The implementation of these suggestions is expected to improve the quality of service and competitiveness of PT XYZ in the global market. Further research is expected to compare MOORA with other methods to strengthen the validity of the results. Thus, this research not only provides a practical contribution to PT XYZ but also adds academic insight into the application of multi-criteria optimization methods in the context of performance management and service improvement.
Pengamanan Citra Menggunakan Kombinasi Algoritma Kriptografi Hill Cipher dan Teknik Transposisi Segitiga Simamora, Windi Saputri; Efendi, Syahril; Nababan, Erna Budhiarti
InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan Vol 6, No 2 (2022): InfoTekJar Maret
Publisher : Universitas Islam Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30743/infotekjar.v6i2.4713

Abstract

Cara untuk mengamankan citra dapat dilakukan dengan kriptografi. Penelitian pada algoritma kriptografi sudah cukup banyak berkembang. Beberapa penelitian menyebutkan bahwa menggabungkan dua algoritma kriptografi dapat lebih meningkatkan keamanan dari citra dibandingkan dengan hanya satu algoritma. Penelitian ini melakukan enkripsi menggunakan kombinasi dua algoritma yaitu teknik transposisi segitiga dan Hill Cipher. Proses penggabungan dua algoritma dilakukan dengan terlebih dahulu mengenkripsi menggunakan teknik transposisi segitiga dan kemudian dilanjutkan dengan Hill Cipher. Begitu juga dengan proses dekripsi yang dilakukan secara kebalikannya. Pada penelitian ini menghasilkan performa yang lebih baik dibandingkan dengan menggunakan satu metode yang dapat dilihat pada nilai rata-rata MSE yang besar yaitu 10878,992 dan rata-rata PSNR yang kecil yaitu 0,781. Hal tersebut menandakan dengan menggabungkan dua algoritma dapat membuat pesan menjadi lebih aman. Metode dalam penelitian ini juga berhasil mengembalikan citra dangan baik tanpa adanya penambahan maupun pengurangan yang dapat dilihat dari hasil MSE dan PSNR yaitu 0 dan ∞.