Claim Missing Document
Check
Articles

Found 4 Documents
Search

Implementasi Algoritma Promethee Dalam Melakukan Analisa Performa Matauang Virtual Ahmad Karim; T.M Diansyah; Rizko Liza
Algoritma: Jurnal Ilmu Komputer dan Informatika Vol 6, No 2 (2022): November 2022
Publisher : Universitas Islam Negeri Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30829/algoritma.v6i2.13837

Abstract

Over the last few years, digital currencies have been rapidly gaining public attention: When cryptocurrencies are created, all confirmed transactions are stored in a general ledger. All coin owner identities are encrypted to ensure the validity of the listing. Because the currency is decentralized, when the owner owns the digital coin Neither the government nor the bank has control over it. The number of performance (criteria) of each virtual currency certainly requires an appropriate method to accommodate these criteria. Virtual currency performance analysis can be used as an answer to this problem. Analysis of the performance of virtual currencies is useful for getting the best investment commodities. Performances (criteria) that can be used as a benchmark for the success of a virtual currency as an investment commodity include the price per coin, Market Capitalization, the number of twitter followers, google trends, coin price increases, the number of coins that have been traded (circulating). supply) and the total number of coins available (max supply). The result of this research is an analysis of virtual currency performance with the promethea algorithm. The purpose of this study is to analyze the level of investment need for people who want to do business in the cryptocurrency field and produce a multi-criteria preference index analysis using Promethee. Keywords: Cryptocurrency, virtual money, algorithm
Klasifikasi User Berdasarkan Trafik Http/Https Menggunakan Metode Naïve Bayes Eko Prayoga; T.M Diansyah; Risko Liza
Algoritma: Jurnal Ilmu Komputer dan Informatika Vol 7, No 1 (2023): April 2023
Publisher : Universitas Islam Negeri Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30829/algoritma.v7i1.15698

Abstract

Along with the times and accompanied by advances in information and communication technology, it is undeniable that at this time all activities use information technology. One of the activities is to use the internet. The research will conduct a classification based on internet usage data obtained through questionnaires using data mining techniques. The attributes that will be used in doing the classification are Name, Age, Gender, Last Education. The method used is the Naïve Bayes method, which is one of the classification techniques in data mining. Based on the research conducted, it was concluded that based on internet user data used as training data, the Naïve Bayes method succeeded in classifying 32 data from 50 data tested. So the Naïve Bayes method succeeded in predicting the magnitude of the percentage of accuracy by 64%. Keywords : Data Mining, Classification, Naïve Bayes
Penerapan Data Mining Untuk Mengidentifikasi Pola Asosiasi Peminatan Program Studi Menggunakan Algoritma Apriori Muhammad Reza Al Faiz Hasibuan; T.M Diansyah; Ilham Faisal
Jurnal Sistem Informasi Triguna Dharma (JURSI TGD) Vol. 4 No. 2 (2025): EDISI MARET 2025
Publisher : STMIK Triguna Dharma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53513/jursi.v4i2.10851

Abstract

Kesalahan dalam pemilihan peminatan program studi oleh mahasiswa merupakan masalah yang dapat memengaruhi hasil akademik dan masa depan akademik mereka. Penelitian ini bertujuan untuk mengatasi masalah tersebut dengan menerapkan metode data mining menggunakan algoritma Apriori dalam konteks identifikasi pola asosiasi antara mata kuliah dalam program studi Teknik Informatika di Universitas Harapan Medan Fakultas Teknik dan Komputer. Dengan menggunakan algoritma ini, penelitian ini memberikan solusi untuk merancang kurikulum yang lebih efisien dan relevan dengan kebutuhan mahasiswa serta industri. Hasil penelitian menunjukkan bahwa algoritma Apriori mampu mengidentifikasi pola asosiasi antara pilihan mata kuliah dan peminatan mahasiswa dengan tingkat kepercayaan yang tinggi. Contohnya adalah korelasi antara stambuk mahasiswa dan pilihan program studi tertentu seperti Multimedia dan Jaringan. Analisis ini memberikan wawasan yang berharga bagi universitas dalam mengoptimalkan penyusunan kurikulum agar lebih sesuai dengan minat dan kebutuhan mahasiswa, sehingga dapat meningkatkan kualitas pendidikan tinggi. Dengan menggunakan rumus Apriori dilakukan langkah algoritma dengan mencari Itemset Frekuensi, Support, Confidence, Pruning, dan Generate Aturan Asosiasi. Penelitian ini menemukan asosiasi antara stambuk dan pilihan program studi mahasiswa di Universitas Harapan Medan Fakultas Teknik dan Komputer. Sebagai contoh, terdapat asosiasi yang signifikan antara stambuk 2021 dan program studi Multimedia, di mana 40% dari mahasiswa dengan stambuk 2021 juga memilih program studi Multimedia, dengan tingkat kepercayaan sebesar 76,67%.  
WEBSITE SECURITY AND HIDING OF SECRET MESSAGES WITH RC4 METHOD AND ADAPTIVE PATTER Rifqi, Luthfi Ahmad; T.M Diansyah; Lubis, Imran
Bahasa Indonesia Vol 17 No 04 (2025): Instal : Jurnal Komputer
Publisher : Cattleya Darmaya Fortuna

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54209/jurnalinstall.v17i04.372

Abstract

The application of technology in the field of data and information security has been carried out a lot. Threats to information security can occur when the information sent is not addressed to everyone but only to certain people, especially if the information provided is confidential. Currently there have been many crimes in cyberspace, where confidential information can be taken by a hacker without being noticed. This raises concerns for the owner of the confidential information. So the purpose of this thesis research is to create a Website for Security and Concealment of Secret Messages with the RC4 Method and Adaptive Pattern which aims to keep secret or hide hidden information so that it is not spread to other unauthorized parties. In the research that has been done, the messages that have been entrusted do not make significant changes to other digital data. It would not physically attract the attention of a potential attacker or hacker, for example an image that looks harmless or not potentially attackable.