Claim Missing Document
Check
Articles

Found 17 Documents
Search

REPRESENTASI PENGETAHUAN (KNOWLEDGE) BERBASIS RULE (RULE-BASED) DALAM MENGANALISA KEKURANGAN VITAMIN PADA TUBUH MANUSIA Ruri Hartika Zain
Jurnal PROCESSOR Vol 8 No 2 (2013): Processor
Publisher : LPPM Universitas Dinamika Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Seiring perkembangan teknologi, dikembangkan pula suatu teknologi yang mampu mengadopsi proses dan caraberpikir manusia yaitu teknologi Artificial Intelligence atau Kecerdasan Buatan. Sistem Pakar adalah salah satubagian dari Kecerdasan Buatan yang mengandung pengetahuan dan pengalaman yang dimasukkan oleh satu ataubanyak pakar ke dalam satu area pengetahuan tertentu sehingga setiap orang dapat menggunakannya untukmemecahkan berbagai masalah yang bersifat spesifik, dalam hal ini adalah masalah dalam menganalisakekurangan vitamin pada tubuh manusia.
PERANCANGAN DAN IMPLEMENTASI CRYPTOGRAPHY DENGAN METODE ALGORITMA RC4 PADA TYPE FILE DOCUMENT MENGGUNAKAN BAHASA PEMROGRAMAN VISUAL BASIC 6.0 Ruri Hartika Zain
Jurnal PROCESSOR Vol 8 No 1 (2013): Processor
Publisher : LPPM Universitas Dinamika Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Masalah keamanan dan kerahasiaan merupakan salah satu aspek penting darisuatu pesan, data, atau informasi. Terdapat banyak sekali ancaman – ancaman dari luar(outdoor), maupun ancaman dari dalam (backdoor) yang mengancam keamanan datayang disimpan pada storage device (alat penyimpanan data). Berdasarkan latar belakangmasalah diatas, maka dibuat suatu sistem kriptography file menggunakan metode RC4.Analisa dan perancangan sistem kriptography dengan metode RC4 tersebut dilakukanterhadap kompleksitas algoritma pada ukuran file (space) dalam melakukan kriptographypada tipe file document. Sistem ini dibangun dengan tujuan menganalisa kompleksitasalgoritma RC4 berdasarkan ukuran dalam proses kriptography. Algoritma RC4 mampumelakukan proses enkripsi dan dekripsi data, dan sekaligus mampu melakukan encode dandecode file sehingga file yang dienkripsi tersebut terdapat perubahan. Untuk tipe filedocument tersebut, ”Semakin besar ukuran file yang akan dienkripsi, maka persentaseperbedaan dengan besar ukuran file hasil enkripsi semakin kecil”.
DESIGN OF PRIVATE CLOUD STORAGE  USING SECURITY METHODS IDS AND IPS Deval Gusrion; Silky Safira; Retno Devita; Ruri Hartika Zain; Rini Sovia
Jurnal Ipteks Terapan (Research Of Applied Science And Education ) Vol. 15 No. 4 (2021): Jurnal Ipteks Terapan ( Research of Applied Science and Education )
Publisher : Lembaga Layanan Pendidikan Tinggi Wilayah X

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1242.307 KB) | DOI: 10.22216/jit.v%vi%i.725

Abstract

Cloud computing is a form of technological progress that has developed along with the times, this has spurred the increasing use of the internet. By usingtechnology internet that is able to implement server a virtual, which has the aim of building a cloud computing server at the District Communications and Information Office. Padang Pariaman uses the Operating System (OS) Proxmox VE (Virtual Environment) 6.4. Cloud computing is able to provide storage services that can be used simultaneously. The results of this study produce a cloud computing server that implements a security system with themethods ids (intrusion detection system) and ips (intrusion prevention system)that are able to process data(storagestorage), use software simultaneously in the network, and use infrastructure within the scope of this research.network cloud computing at the District Communications and Information Office. Padang Pariaman using aservice model private cloud
Sistem Deteksi Otomatis dan Self Cleaning pada Cat Litter Box Masril, Mardhiah; Ghinaa Fadhiilah; Ruri Hartika Zain; Billy Hendrik
JURNAL QUANCOM: QUANTUM COMPUTER JURNAL Vol. 2 No. 1 (2024): Juni 2024
Publisher : LPPM-ITEBA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62375/jqc.v2i1.325

Abstract

This research discusses the development of an Automatic Detection and Self Cleaning System on a Cat Litter Box using the Wemos D1 mini microcontroller, to improve the efficiency of cat maintenance. In this context, cats as pets have psychological uniqueness closely related to humans. The litter box, as a specific place for burying cat feces and urine, requires continuous attention and maintenance to keep it clean. This research develops a device that automatically detects cats entering the litter box, and then separates the feces from the sand in the cat litter box. The feces are transferred to a container that will be weighed using a load cell. Cat owners will receive notifications on their smartphone devices through their Telegram application to dispose of the waste. The system also monitors the sand height in the storage container, and the sand dispenser will refill it to a certain limit. The development of this system is expected to provide a solution for cat owners who need to leave their pets for a certain period. This research also demonstrates positive results through testing and notifications on smartphone devices as well as display on the LCD screen in the litter box.
Introduction to the Concept and Practice of Using Arrays in Programming Languages ​​at Senior High School 2 Gunung Talang, Solok Regency: Pengenalan Konsep dan Praktik Penggunaan Array pada Bahasa Pemrograman di SMA 2 Gunung Talang Kabupaten Solok Rima Liana Gema; Mutiana Pratiwi; Ruri Hartika Zain; Rini Sovia
Journal of Community Service and Application of Science Vol. 2 No. 2 (2023): JOURNAL OF COMMUNITY SERVICE AND APPLICATION SCIENCE (JCSAS)
Publisher : KPN Kopertis X

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62769/fd8gdp69

Abstract

Introduction to the Concept and Practice of Using Arrays in Programming Languages ​​is an effort to provide education and guidance to teachers at Senior High School 2 Gunung Talang, Solok who are interested in computer programming. Knowledge of the use of arrays in programming languages ​​is an important basis in the increasingly developing world of information technology. This community service activity aims to provide a broader understanding of the concepts and practices of using arrays in programming languages, especially for those who do not have a technical background in programming. In this activity, participants will be invited to understand the basic concepts of arrays, how to declare, initialize and access array elements in programming languages. This activity will provide an introduction to various types of arrays, such as one-dimensional arrays, two-dimensional arrays, and multidimensional arrays, as well as provide examples of practical use in everyday programming. Participants will also be taught about the benefits of using arrays, including how they can simplify code, increase efficiency, and optimize data management. It is hoped that the results of this service will provide benefits to the community by increasing their understanding of the use of arrays in programming languages. With this knowledge, participants become better prepared to overcome programming challenges and apply them in various fields, such as software development, data analysis, and information technology in general
Language Processing for Detecting Fake News on Twitter Using a Long Short-Term Memory Architecture Rini Sovia; Dwi Andhara Valkyrie; Ruri Hartika Zain; Firdaus
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 9 No 4 (2025): August 2025
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v9i4.6570

Abstract

The rapid spread of misinformation on social media platforms, particularly X (formerly Twitter), poses a significant challenge to public trust and democratic integrity. Fake news is often crafted to deceive readers and manipulate public opinion, especially in political contexts such as the 2024 Regional Head Elections (Pilkada 2024). Although various measures have been proposed to mitigate this issue, achieving an effective balance between controlling misinformation and preserving free speech remains a challenge. This study aims to address this problem by developing a fake news detection model based on Natural Language Processing (NLP) and Long Short-Term Memory (LSTM). The dataset used in this study was collected from public tweets related to Pilkada, with Kompas.com serving as the validation source to verify content authenticity. Experimental results show that the proposed LSTM model outperformed traditional classification methods, achieving a precision, recall, and F1-score of 0.95, along with an overall accuracy of 94.90%. Confusion matrix analysis further confirmed the reliability of the model by demonstrating low misclassification rates. This study contributes to the advancement of AI-driven hoax detection systems, offering an automated and scalable solution for combating misinformation in political discourse.
Inovasi Helm Infanteri Terintegrasi Battlefield Management System Untuk Monitoring Area Pertempuran Secara Real-Time Masril, Mardhiah; Ghaly Risyadi; Ruri Hartika Zain; Firdaus
JURNAL QUANCOM: QUANTUM COMPUTER JURNAL Vol. 3 No. 2 (2025): Desember 2025
Publisher : LPPM-ITEBA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62375/jqc.v3i2.770

Abstract

This study aims to design and develop an Army infantry helmet system integrated with a Battlefield Management System (BMS) to support real-time monitoring of soldier conditions and combat strategies. The system integrates various sensors, including heart rate monitoring, hazardous gas detection (MQ-135), gyroscopic orientation (MPU6050), digital compass (HMC5883L), and GPS positioning (NEO-6M), managed by Arduino and NodeMCU microcontrollers. Sensor data is transmitted using LoRa communication modules and forwarded via the MQTT protocol to a monitoring system built with Grafana for real-time interactive dashboard visualization. The system is designed to provide periodic data on soldiers’ physical conditions and surrounding environments, aiming to enhance the speed and accuracy of strategic decisions on the battlefield. The prototype was tested in a simulated environment with a focus on sensor accuracy, transmission stability, and visualization reliability, showing promising results as an initial step toward IoT-based military monitoring and protection systems.