Claim Missing Document
Check
Articles

Diagnosa Penyakit Epilepsi Menggunakan Metode Bayes Ade Rahayu; Achmad Fauzi; Victor Maruli Pakpahan
Modem : Jurnal Informatika dan Sains Teknologi. Vol. 2 No. 4 (2024): Oktober : Modem : Jurnal Informatika dan Sains Teknologi
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/modem.v2i4.231

Abstract

Epilepsy, or apoplexy, is a chronic disease characterized by recurrent seizures and impaired consciousness due to disorders of the central nervous system. In developing countries, including in RSU Putri Bidadari, epilepsy management is often hampered by high consultation costs, resulting in suboptimal quality of treatment and patient recovery. To overcome this challenge, a system is needed that can facilitate the diagnosis and treatment of epilepsy more efficiently. By using this method, RSU Putri Bidadari can improve the precision of epilepsy diagnosis and determine more appropriate treatment steps, despite limited resources. The Bayes method, as a statistical approach, offers a potential solution to improve the accuracy of diagnosis through data-based probability estimation of diseases and symptoms reported by patients such as frequent hunger, thirst, urination, weight loss, vaginal infections, easy fatigue, tingling legs, and blurred vision. The analysis results of the system show an estimated probability of 73% for patients suffering from generalized epilepsy. The Bayes method-based system is expected to help RSU Putri Bidadari in providing more effective treatment and improving the overall quality of life of epilepsy patients.
Design of Gas Leakage Monitoring System Based on Android Application and NodeMCU ESP8266 Nabil Fuadi; Fauzi, Achmad; Khair, Husnul
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.585

Abstract

Gas leakage is a serious problem that can threaten public safety and health and cause significant material losses. This research aims to design and implement a gas leak monitoring system that can be accessed remotely based on Android applications and NodeMCU ESP8266. NodeMCU ESP8266 is chosen as the main microcontroller equipped with an MQ-2 gas sensor to detect the presence of hazardous gas. This research incorporates Internet of Things (IoT) technology to allow users to remotely monitor the condition of gas leaks, thereby increasing the level of safety in the use of gas in households or small industries. The hardware design includes the use of an MQ-2 gas sensor that is sensitive to certain gas concentrations, as well as setting up an ESP8266 NodeMCU to transmit detection data to a Firebase server for later access through an Android application. The Android application was developed using Android Studio with a focus on an intuitive user interface to monitor the status of gas leaks in real-time. he research methods used include system design, hardware and software implementation, and thorough system testing by simulating gas leak scenarios to test the reliability and response of the system. The results show that the system can detect gas leaks with high accuracy. It is expected that the system developed in this research can be a practical and effective solution in reducing the risk of accidents caused by gas leaks, as well as making a positive contribution in increasing awareness of the safety of gas use in the community.
Design and Build Running Text Controls Using IoT Aji Tyo Syahputra; Fauzi, Achmad; Milli Alfhi Syari
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.625

Abstract

This research designs and builds an Internet of Things (IoT)-based running text control system using the P10 display module which can be controlled through the Blynk application and displays the temperature in real-time using the DHT22 sensor. The system consists of hardware such as a microcontroller, Wi-Fi module, P10 LED display, and DHT22 sensor to measure temperature and humidity. The Blynk app is used as a user interface to control the messages displayed on the P10 module and monitor the temperature data in real-time. Software development is carried out to integrate the hardware with the Blynk application and enable efficient data transmission. The test results show that this system is able to accurately display text messages and temperature data with low latency. These systems can be applied in a variety of scenarios such as public information systems, environmental surveillance, and dynamic advertising applications.
Design and Build Automatic Fan Control Based Internet of Things Septian, Refli; Achmad Fauzi; Milli Alfhi Syari
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.634

Abstract

This research aims to create and develop an automatic fan control system based on the Internet of Things (IoT) that can regulate the room temperature well. The NodeMCU ESP8266 serve as a microcontroller for this system. The DHT22 sensor detects temperature, the L298N Driver Motor controls the speed of the 12V DC fan, and the 16x2 LCD displays temperature information in realtime. When the room temperature exceeds the threshold, the fan will automatically turn on and off when the temperature returns to normal. The Blynk app also allows users to monitor and control fans through smartphones. It allows users to manually control the fan and monitor it remotely. The results of the study show that this system works well and improves user comfort by managing the room temperature. The system also offers high flexibility with IoT integration, allowing for further development for wider applications in home automation and energy management.
Improving the Quality of Digital Images on Identity Cards Using Contrast Stretching and Retinex Methods Salsabilla, Nur; Achmad Fauzi; I Gusti Prahmana
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.645

Abstract

Enhancing the image quality of the Indonesian Identity Card is crucial to ensure the clarity and accuracy of information in various applications, such as identity verification, administration, and security. This study aims to improve the digital image quality of Identity Card using the Contrast Stretching and Retinex methods. Contrast Stretching is employed to enhance image contrast, while the Retinex method is used to maintain and improve the clarity of colors and image details. The implementation of these methods is carried out using Python. The test results show that these methods are effective in improving the quality of Identity Card images, making the information on the images clearer and easier to read. This research contributes to the development of more advanced image processing technology, which can be applied to various verification and administrative needs that require high reliability.
Super Encryption Feal Algorithm and Base64 Algorithm Image File Security Br Bangun, Tiara; Achmad Fauzi; I Gusti Prahmana
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.647

Abstract

In the rapidly advancing digital era, image file security has become a critical issue, especially with the increasing risks of data breaches and attacks on digital files. This study aims to enhance the security of image files by implementing a combination of two cryptographic algorithms: Fast Data Encipherment Algorithm- 4 (FEAL-4) and Base64. FEAL-4 is a symmetric encryption algorithm known for its high speed and processing efficiency, while Base64 is used for encoding binary data into ASCII format to ensure safer transmission. This research develops a super encryption system that integrates these two algorithms to protect the integrity and confidentiality of image files, particularly for BMP, JPEG, and PNG formats. The implementation was carried out using the Visual Basic programming language. The results of the study show that the combination of FEAL-4 and Base64 algorithms significantly enhances the security of image files, with a high success rate in the encryption and decryption processes.
Super Encryption of Rabin Cryptosystem Algorithm and Paillier Cryptosystem Algorithm on Digital Image Security Process Ramanda, Dika; Achmad Fauzi; Pakpahan, Victor Maruli
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.659

Abstract

Technological advances have given rise to the need for data protection, especially digital images, which are vulnerable to misuse. This research proposes a super encryption method that combines two cryptographic algorithms, namely Rabin Cryptosystem and Paillier Cryptosystem, to increase digital image security. Rabin's algorithm does not have homomorphism, so it is vulnerable to factorization attacks if the prime numbers used are too small. Meanwhile, the Paillier algorithm has homomorphism properties which allow arithmetic operations to be carried out directly on the ciphertext without decryption. By combining these two algorithms, this research aims to create a stronger and more efficient encryption method, and analyze its performance in terms of computational efficiency and complexity. It is hoped that the research results can improve the security and privacy of digital data, especially in the context of digital images.
Digital Image Security Analysis using Hill Cipher and AES Algorithm Ranti, Dwi; Achmad Fauzi; Sitompul, Melda Pita Uli
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.665

Abstract

In today's digital era, digital image exchange has become very common in various industries, but this also increases security risks such as counterfeiting, image manipulation, and information theft. To protect the confidentiality of information in digital images, encryption is a fairly effective method. Hill Cipher, as a classic cryptographic method, offers matrix-based encryption, while Advanced Encryption Standard (AES) is known for its high level of security and efficiency. By combining Hill Cipher and AES, encryption systems can leverage the strengths of classic and modern cryptography together, providing an additional layer of protection that strengthens the security of digital data and reduces vulnerabilities that may exist in each method separately. This approach provides a more comprehensive solution for maintaining the confidentiality of digital images in the context of evolving security threats.
Diagnosa Penyakit Kanker Prostat menggunakan Metode Certainty Factor Nezha Febriyan; Achmad Fauzi; Victor Maruli Pakpahan
Mars : Jurnal Teknik Mesin, Industri, Elektro Dan Ilmu Komputer Vol. 2 No. 5 (2024): Oktober : Mars : Jurnal Teknik Mesin, Industri, Elektro Dan Ilmu Komputer
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/mars.v2i5.341

Abstract

The rapid development of information technology affects the way people access information, including in the health sector. Prostate cancer, as one of the most significant types of cancer in men, is often detected late due to lack of information and limited costs. To overcome this problem, a system is needed that is able to diagnose prostate cancer quickly, precisely, and accurately. This study aims to develop a web-based expert system using the Certainty Factor (CF) method to diagnose prostate cancer based on the symptoms that appear. The CF method was chosen because of its ability to determine the level of confidence in the facts or rules used in the diagnosis. This study uses data on symptoms and types of prostate cancer. The results of the study can help the public in recognizing prostate cancer symptoms early, with a high level of accuracy in diagnosis. This study is expected to make it easier for patients to make an early diagnosis and accelerate the treatment of prostate cancer.
SUPER ENKRIPSI DATA TEKS : KOMBINASI ALGORITMA AFFINE CIPHER, ELGAMAL, DAN RSA UNTUK PERLINDUNGAN OPTIMAL: Teknik Super Enkripsi pada Kriptografi Muhammad Al Kahfi; Mita Auva; Denny Prayuda Putra; Chintya Dwi Putri Br. Ginting; Achmad Fauzi
Jurnal Sistem Informasi Kaputama (JSIK) Vol. 9 No. 1 (2025): Volume 9, Nomor 1, Januari 2025
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59697/jsik.v9i1.949

Abstract

Keamanan data telah menjadi perhatian utama, terutama untuk mencegah akses, manipulasi, dan pencurian data teks. Penelitian ini mengusulkan sebuah teknik enkripsi baru yang mengintegrasikan algoritma Affine Cipher, ElGamal, dan RSA. Pengakuan akan kekuatan masing-masing adalah dasar dari integrasi algoritma ini. Karena Affine Cipher mudah dioperasikan dan efisien pada tahap pertama proses enkripsi, maka algoritma ini dipilih. ElGamal dipilih untuk kriptografi kunci publik, yang terkenal untuk meningkatkan keamanan; RSA dipilih karena kemampuannya untuk menyediakan manajemen kunci yang aman dan melawan serangan brute force. Tiga fase adalah bagian dari metode enkripsi yang diusulkan. Affine Cipher mengenkripsi data teks terlebih dahulu; ElGamal meningkatkan keamanan kedua; dan yang terakhir, RSA meningkatkan perlindungan kunci. Penelitian ini berfokus pada investigasi kemanjuran dan kompleksitas keamanan algoritma. Penelitian ini diproyeksikan untuk memberikan solusi keamanan data teks yang dapat diterapkan untuk pemerintah, kesehatan, dan perbankan serta sektor lainnya.
Co-Authors Ade Rahayu Ade Syahputri Ade Syahputri Adelia Ramadani Agus Sapitri, Liana Aji Tyo Syahputra Andre Anggi Meliana Br Hutasoit Arianta Bangun Arnes Sembiring Asrul Reza Br Bangun, Tiara Buaton, Relita Budi Serasi Ginting Budi Serasi Ginting Chintya Dwi Putri Br. Ginting Cici Armayani Cristin Adelianan Br PA Deli Alvinda Denny Prayuda Putra Deny Jollyta Deri Kurniawan Diki Kurniadi Diky Jaswa Dilla Sillfani Dimas Dimas Dimas Fatmaira, Zira Feni Yasari Br Surbakti Fira Dwi Yanti Firliansyah, Aulia Fitri Handayani GOESTI MESKANA PELAWI PELAWI Gultom, Imeldawaty Hakim, Azizhil Hermansyah Sembiring Hermansyah Sembiring Hermansyah Sembiring Hidayatullah Hidayatullah I Gusti Prahmana Ihsan Wibowo Zakti Iis Joice Susanti Marpaung Kadim, Lina Arliana Nur Khair, Husnul Lina Arliana Magdalena Simajuntak Mega Ayu Ningrum Melda Pita Uli Sitompul Meliala, Evan Syahputra Mili Alfhi Syari Mita Auva Muhammad Al Kahfi Muhammad Ali Imran Muhammad Fadillah Azmi Muhammad Haris N Novriyenni Nabil Fuadi Nasution, Raja Imanda Hakim Nezha Febriyan Novi Yunanda Putri Novriyenni - Nurhayati Pakpahan, Victor Maruli Pardede, Akim Manaor Hara Pasaribu, Tioria Rahayu, Rizka Putri Ramanda, Dika Rani Rianda Br Ginting Ranti, Dwi Renika Ayuni Riza Maria Ulfa Br Matondang Riza Maria Ulfa Br Mtd Rizka Putri Rahayu Rizka Putri Rahayu Rizka Putri Rahayu Rizki Oktavinus Tarigan Ronauli Silaban Rusmin Saragih, Rusmin Safna Safitri Salsabilla, Nur Sembiring, Hermansyah Septian, Refli Sihombing, Anton Simanjuntak, Magdalena Sri Defriani Br Sembiring Sri Melisa suci ramadani Susilawati Susilawati Syari, Milli Alfhi Winda Sari Windy Maulianda Yani Maulita Yusfrizal Yusfrizal Yustika Septiani Muzahardin Yustika Septiani Muzahardin Zhya Anggraini Zidan Hafiz