Claim Missing Document
Check
Articles

Perbaikan Citra Digital Pada Foto Dengan Menggunakan Metode Retinex Yustika Septiani Muzahardin; Achmad Fauzi; Nurhayati Nurhayati
JTIK (Jurnal Teknik Informatika Kaputama) Vol 6, No 1 (2022): Volume 6, Nomor 1 Januari 2022
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data atau informasi tidak hanya disajikan dalam bentuk teks, tetapi juga dapat berupa gambar, audio, dan video. Ketiga macam data atau informasi ini sering disebut dengan multimedia. Sebagai salah satu bagian dari multimedia, citra (gambar) memegang peranan penting sebagai bentuk informasi visual. Citra mempunyai karakteristik yang tidak dimiliki oleh teks, yaitu citra kaya dengan informasi. Citra digital adalah proses gambar berdimensi dua melalui komputer digital yang keberadaannya untuk memanipulasi dan memodifikasi citra dengan berbagai cara. Pada penelitian ini, memiliki input berupa gambar informasi keluaran pada proses perbaikan daerah yang pixel nya kosong (tampak pecah). maka dibutuhkan perbaikan mutu atau kualitas citra (Image Enhancement) dengan menggunakan metode retinex untuk mengatasi citra yang berbintik (noise) agar dapat menambah kualitas warna sehingga dapat menjadi jelas dan baik kembali. Metode retinex dapat menghasilkan perbaikan citra dengan performansi yang cukup tinggi. Sehingga dapat memperbaiki kualitas citra pada foto.
Data Mining Pengelompokan Pembayaran Listrik Menggunakan Metode Clustering Adelia Ramadani; Achmad Fauzi; Anton Sihombing
El-Mujtama: Jurnal Pengabdian Masyarakat Vol 2 No 3 (2022): El-Mujtama: Jurnal Pengabdian Masyarakat 
Publisher : Intitut Agama Islam Nasional Laa Roiba Bogor

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (892.756 KB) | DOI: 10.47467/elmujtama.v2i3.1950

Abstract

Electricity is a basic need that greatly influences all community and government activities. Almost all people from the upper to the lower classes, both in the fields of education, government, economics and social, really need a source of electrical energy as a means of supporting activities and productivity. PLN (Persero) is a State-Owned Enterprise (BUMN) that provides services to the community in the provision of electricity. The K-Means algorithm is one of the clustering technique algorithms that starts with random selection, which is the number of clusters that you want to form from the data to be clustered, namely electricity payments. the system made from k-means displays the results of the clustering of electricity payments, namely the pattern of electricity payments whose clusters are up, fixed and down. By utilizing a number of data owned by the agency, it can be grouped using data mining technology. The use of data mining techniques in classifying electricity payments is expected to be useful to simplify the process of searching for system data, which previously was still manual Keywords: Data Mining, K-Means, Electricity
Sistem Pakar Diagnosa Penyakit Kelapa Sawit Dengan Menggunakan Metode Certainty Factor Hidayatullah Hidayatullah; Budi Serasi Ginting; Achmad Fauzi
Bulletin of Multi-Disciplinary Science and Applied Technology Vol 1 No 5 (2022): Agustus 2022
Publisher : Forum Kerja Sama Penddikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Computer development is very important in information notification and data processing, computer development can also play a role in analyzing the symptoms of problems that occur. Oil palm plantations are currently growing in Indonesia and almost all of oil palm is grown throughout the archipelago. Oil palm plants are very beneficial for humans because oil palm fruit as a palm oil-producing plant and palm kernel is one of the prima donna of plantation crops which is a source of non-oil and gas foreign exchange for Indonesia. Because of the importance of oil palm resulting in increased production. However, there is an imbalance in the production of oil palm fruit due to the lack of understanding of the farmers to overcome the diseases that attack oil palm plants. It takes an expert system that will incorporate all expert knowledge in a system so that it can diagnose diseases in oil palm anytime and anywhere. The Certainty factor (CF) method is a method to prove whether a fact is certain or uncertain in the form of a metric that is usually used in expert systems. This method is very suitable for expert systems that diagnose something that is not certain. Based on the results of the CF calculation, the highest value was in the type of palm root rot disease with a value of 97.29%. From the results obtained, the system diagnoses the oil palm tree diagnosed with palm root rot disease.
Penerapan Machine Learning Untuk Klasifikasi Tingkat Kematangan Buah Anggur (Vitis) Dengan Metode K-Nearest Neighbor Sri Melisa; Achmad Fauzi; Yusfrizal Yusfrizal
Bulletin of Multi-Disciplinary Science and Applied Technology Vol 1 No 5 (2022): Agustus 2022
Publisher : Forum Kerja Sama Penddikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Grapes are fruit plants in the form of vines belonging to the Vitaceae family that can be eaten directly or processed into drinks and food. Grapes have color characteristics to determine the level of ripeness of fruit correctly. Determination of ripeness of grapes is usually done directly by looking at the color of ripeness of the fruit grapes that can be seen from the color red if it is ripe and green if it is not ripe. And this could be a mistake in classifying and determining the level of fruit maturity. Classification is a way of grouping objects based on the characteristics possessed by the object of classification. Classification is carried out by computers using the methods used to classify. K-nearest neighbor is a method that can be used in classification and is a machine learning algorithm with a supervised learning approach that works by classifying new data using the similarity between new data and a number of data (k) at the closest available location. KNN algorithm is used for classification and regression. By using the majority category, the classification results from the three best data can be labeled as targets according to the initial dataset. The best data is data to 2, 3, 10 of these data, there are 1 category of immature and 2 ripe, so that the majority of the classification results are ripe grapes. So the classification results for test image data 11 are grapes included in the ripe classification category.
Pengecekan Bit Error Pada Media Transmisi Pengiriman Gambar Menggunakan Metode Hamming Code Deli Alvinda; Achmad Fauzi; Husnul Khair
Bulletin of Multi-Disciplinary Science and Applied Technology Vol 1 No 5 (2022): Agustus 2022
Publisher : Forum Kerja Sama Penddikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The successful delivery of information from the sender (transmitter) to the receiver (receiver) is one thing that is very important in determining the reliability of a communication system. In the world of communication, both communication using cables or using air as a transmission medium will inevitably experience disturbances in the communication process caused by a disturbance called noise. Noise is an unwanted electrical signal. The addition of this unwanted signal in a communication process is a major limiting factor in data communication systems. In the process of data communication, the possibility of data errors received can occur because the data becomes an error and must be re-sent. Hamming code is an error detection method that is able to detect several errors, but is only able to correct one error (single error correction). This error detection method is very suitable for use in situations where there are several random errors.
Sistem Pendeteksi Wajah Berjerawat Pada Citra Digital Menggunakan Metode Viola Jones Windy Maulianda; Achmad Fauzi; Mili Alfhi Syari
Bulletin of Multi-Disciplinary Science and Applied Technology Vol 1 No 6 (2022): Oktober 2022
Publisher : Forum Kerja Sama Penddikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of computer technology that is increasingly advanced and sophisticated, makes computer experts have the desire to create the latest software in computers. One of them is image data processing by utilizing digital image data processing that can be used in recognizing the shape of an object. Acne (acne vulgaris) is a disease caused by chronic inflammation of the pilosebaceous unit characterized by the formation of comedones, papules, pustules, nodules that can grow on the face, back, chest, arms, legs. Acne itself arises due to hormonal changes experienced by sufferers. To find out the acne can be seen directly or palpated on the face area. Improper handling of acne can harm facial skin and cause inflammation. It takes a system that can identify acne by applying image processing. The Viola Jones method is an object detection method that has a fairly high level of accuracy, which is about 93.7%
Penerapan Algoritma RSA Dan AES Dalam Pengamanan Data Tunggakan Tagihan PDAM Kota Binjai Rani Rianda Br Ginting; Achmad Fauzi; Husnul Khair
Bulletin of Multi-Disciplinary Science and Applied Technology Vol 1 No 6 (2022): Oktober 2022
Publisher : Forum Kerja Sama Penddikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

-
Expert System Diagnoses Android Handphone Damage Using Web-Based Dempster Shafer Method Arianta Bangun; Achmad Fauzi; Rusmin Saragih
Bulletin of Multi-Disciplinary Science and Applied Technology Vol 1 No 6 (2022): Oktober 2022
Publisher : Forum Kerja Sama Penddikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Mobile is a communication tool that can be carried anywhere because it does not use cables like conventional fixed line telephones. Mobile phones can be obtained at very affordable prices so that mobile phones are no longer categorized as luxury goods. By using a mobile phone, users can make and receive calls to and from other mobile phone networks around the world. The sophisticated use of mobile phones can solve all interests more effectively and efficiently. Another function of mobile phones is that it can be a medium of entertainment, educational media, business media and so on. In general, every electronic item can be damaged and mobile phones are one of them. For example, it gets hot quickly, the battery runs low quickly and even the cellphone is in a condition that it can't turn on at all (totally dead). Damage that occurs can be categorized as light or heavy damage. So by knowing what category of damage occurs, it can make repairs or services on cellphones more optimal. To find out the damage that occurs requires a system that can categorize the damage to the android phone by using an expert system. An expert system is a system that can store the knowledge of experts or experts in the system. Expert systems are used to solve problems and improve problem solving abilities. Dempster Shafer is one method that can be used in expert systems. The Dempster Shafer method is a method of uncertainty to produce an accurate diagnosis. Due to the addition or deletion of new facts in the form of information about symptoms and disorders. This method gives experts confidence in their knowledge. So that from the case study conducted, it will be found that the Dempster Shafer method testing with the customer diagnoses based on the symptoms with a final value of 100%, the customer experiences Short Damage.
Hybrid Cryptosystem Algorithm Vigenere Cipher and Base64 for Text Message Security Utilizing Least Significant Bit (LSB) Steganography as Insert into Image Nasution, Raja Imanda Hakim; Achmad Fauzi; Husnul Khair
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.201

Abstract

Security message text is aspect important in modern communications for guard privacy and confidentiality information. Without exists guarantee security, of course just can raises risk when sensitive and valuable information are accessed by unauthorized persons responsible answer. Cryptography and steganography is two field used in a manner wide For reach objective this. Algorithm Vigenere Cipher and Base64 are method used for encryption message text and Least Significant Bit (LSB) steganography was used as method for insert message encrypted to in image. LSB makes use of the last bits from pixels image for keep information addition without bother image visual display in a manner significant. With utilise method here, order encrypted can hidden in a manner confidential in image that looks normal. This hybrid cryptosystem combine excess from third algorithm such, ie speed and effectiveness encryption use algorithm Vigenere Cipher as well ability Base64 characteristics, and levels security message more increase.
Implementation Of Affine Cipher Combination And Merkle Hellman On The Process Digital Image Security Muhammad Fadillah Azmi; Achmad Fauzi; Husnul Khair
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.204

Abstract

The use of image media information has several weaknesses, one of which is the ease with which it can be manipulated by irresponsible people. Efforts made in increasing the security of this image is cryptography, namely the science and art of maintaining the security and confidentiality of images. Cryptography is used so that the confidentiality of the image can be maintained, so that it is not known by others. In general, there are 2 (two) techniques for carrying out cryptographic processes, namely encryption and decryption. In this study, the encryption process was first carried out using the Affine Cipher algorithm and then continued with the Merkle Hellman algorithm, while the decryption was carried out first by Merkle Hellman and then decrypted again with the Affine Cipher. The results of this study indicate that applying the Affine Cipher and Merkle Hellman algorithms can secure images. At the end of this system is an image that is in the form of blur so that it is not known and not understood by others. That way people who are not entitled cannot understand from the image.
Co-Authors Ade Rahayu Ade Syahputri Ade Syahputri Adelia Ramadani Agus Sapitri, Liana Aji Tyo Syahputra Andre Anggi Meliana Br Hutasoit Arianta Bangun Arnes Sembiring Asrul Reza Br Bangun, Tiara Buaton, Relita Budi Serasi Ginting Budi Serasi Ginting Chintya Dwi Putri Br. Ginting Cici Armayani Cristin Adelianan Br PA Deli Alvinda Denny Prayuda Putra Deny Jollyta Deri Kurniawan Diki Kurniadi Diky Jaswa Dilla Sillfani Dimas Dimas Dimas Fatmaira, Zira Feni Yasari Br Surbakti Fira Dwi Yanti Firliansyah, Aulia Fitri Handayani GOESTI MESKANA PELAWI PELAWI Gultom, Imeldawaty Hakim, Azizhil Hermansyah Sembiring Hermansyah Sembiring Hermansyah Sembiring Hidayatullah Hidayatullah I Gusti Prahmana Ihsan Wibowo Zakti Iis Joice Susanti Marpaung Kadim, Lina Arliana Nur Khair, Husnul Lina Arliana Magdalena Simajuntak Mega Ayu Ningrum Melda Pita Uli Sitompul Meliala, Evan Syahputra Mili Alfhi Syari Mita Auva Muhammad Al Kahfi Muhammad Ali Imran Muhammad Fadillah Azmi Muhammad Haris N Novriyenni Nabil Fuadi Nasution, Raja Imanda Hakim Nezha Febriyan Novi Yunanda Putri Novriyenni - Nurhayati Pakpahan, Victor Maruli Pardede, Akim Manaor Hara Pasaribu, Tioria Rahayu, Rizka Putri Ramanda, Dika Rani Rianda Br Ginting Ranti, Dwi Renika Ayuni Riza Maria Ulfa Br Matondang Riza Maria Ulfa Br Mtd Rizka Putri Rahayu Rizka Putri Rahayu Rizka Putri Rahayu Rizki Oktavinus Tarigan Ronauli Silaban Rusmin Saragih, Rusmin Safna Safitri Salsabilla, Nur Sembiring, Hermansyah Septian, Refli Sihombing, Anton Simanjuntak, Magdalena Sri Defriani Br Sembiring Sri Melisa suci ramadani Susilawati Susilawati Syari, Milli Alfhi Winda Sari Windy Maulianda Yani Maulita Yusfrizal Yusfrizal Yustika Septiani Muzahardin Yustika Septiani Muzahardin Zhya Anggraini Zidan Hafiz