Claim Missing Document
Check
Articles

Found 28 Documents
Search

THE DATA MINING OF CELL PHONE MOST INTERESTED USING APRIORIAL ALGORITHM Penda Sudarto Hasugian
INFOKUM Vol. 7 No. 1, Desembe (2018): Data Mining And Image Processing
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (369.045 KB)

Abstract

Data mining is a term used to describe knowledge discovery in a database or often called Knowledge Discovery in Database (KDD). With the development of information at this time, the need for accurate information is needed in daily life, so that information will become an important element in the development of society today and the future. However, high information needs are sometimes not balanced by the presentation of adequate information, often the information must still be extracted from very large amounts of data. The ability of information technology to collect and store various types of data far leaves the ability to analyze, summarize and extract knowledge from data. Decision-makers try to utilize data warehouse that has been owned to dig up information that is useful to help make decisions, this encourages the emergence of new branches of science to overcome the problem of extracting information or patterns that are important or interesting from large amounts of data, which is called data mining. The use of data mining techniques is expected to provide knowledge previously hidden in the data warehouse so that it becomes valuable and useful information.
THE CONCEPT OF APPLICATION OF MACHINE LEARNING IN THE ENVIRONMENT INTERNET OF THINGS Sulindawaty Sulindawaty; Jijon R Sagala; Penda Sudarto Hasugian
INFOKUM Vol. 9 No. 2, June (2021): Data Mining, Image Processing and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1444.231 KB)

Abstract

Machine Learning is an application of computers and mathematical algorithms adopted by means of learning that comes from data and produces predictions in the future. The learning process in question is an attempt to acquire intelligence through two stages, including training and testing. The Internet of Things is a network that can connect anything in the supply chain, including people, machines and systems, where efficient supply chain management is guaranteed. This is done through visualizing any object/thing in the supply chain by monitoring, tracking and providing a third dimension to organizational data, that if analyzed can improve all supply chain processes. In the IoT environment, Machine Learning is very suitable to be applied which can provide many benefits including Resolving Data Inefficiency Problems, Automating Business Processes, Visualizing Supply Chain Management (Supply Chain), Risk Management and Maximizing Profits. By implementing IoT and Machine Learning, of course, it can fulfill business opportunities, namely: process optimization, speed optimization, adaptability optimization and reliability optimization
Application of the Certainty Factor Method to Diagnose Escherichia Coli Bacteria in Refilled Drinking Water Agustina Simangunsong; Penda Sudarto Hasugian
Jurnal Info Sains : Informatika dan Sains Vol. 10 No. 1 (2020): March, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (691.262 KB) | DOI: 10.54209/infosains.v10i1.26

Abstract

An expert system is a software package or computer program package that is intended as a provider of advice and aids in solving problems in certain areas of specialization, such as problems in medicine, education, and so on.The development of expert system development in the field of bacteriology is one thing that is expected to improve the quality of human life. One of them is to apply an expert system using the Certainty Factor method to diagnose escherichia coli (e-coli) bacteria in refilled drinking water. This study aims to increase knowledge about how to make an inference engine to control the process of identifying solutions using the Certainty Factor method and to design an expert system application using the Certainty Factor method to diagnose Escherichia coli bacteria in refill drinking water.
Implementation Of Least Significant Bit (LSB) Algorithm For Data Security In Digital Imagery Penda Sudarto Hasugian Hasugian; Agustina Simangunsong
Jurnal Info Sains : Informatika dan Sains Vol. 10 No. 2 (2020): September, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (845.158 KB) | DOI: 10.54209/infosains.v10i2.31

Abstract

In this study, a software was built that can insert text messages into image files (steganography) and steganalisis or detect the presence or absence of secret messages in an image. Imagery is the most commonly used medium for inserting secret messages, as it can hide messages very well and is widely available. The built software implements steganalisis with the Least Significant Bit (LSB) algorithm which is the most widely used message insertion algorithm. Steganlysis software is built using LSB algorithms to perform insertion and extract insertion messages on image files. The LSB algorithm in this study used the microsoft Visual Basic 6.0 programming language tools. Based on the software tests conducted, it can be seen that the software can run well on insertion and detect the presence or absence of secret messages on image files.
Perancangan Website Sebagai Media Promosi Dan Informasi Penda Sudarto Hasugian
Journal Of Informatic Pelita Nusantara Vol 3 No 1 (2018): Journal Of Informatic Pelita Nusantara
Publisher : STMIK Pelita NUsantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (252.618 KB)

Abstract

Along with the current technological developments, technology is widely used as a means of promotion and information, especially in the field of websites that currently become a medium of information that offers a variety of ease in presenting information. Speed and comfort is a positive value of the internet. Websites are more accessible to people in different regions just by using the internet. One of them in terms of product marketing a business, the website can be a means of promoting, marketing and convey effective and efficient information to the community. Ves Boutique is a business engaged in the field of fashion. In promoting and marketing, the boutique is still using less efficient way of them through brochures, banners in front of the store. The boutique can utilize the website as a media promotion and information to advance the boutique and show that the boutique has a good quality in terms of promotion. In designing the website as a media campaign and information on the ves boutique consists of two pages including, admin page and main page. Consumers can access without having to login first. This is done to facilitate the consumer. In this website, consumers can place a product order directly without having to visit the boutique. This website is designed using PHP and MySQL as the database. Keywords: Website, Media Promotion and Information, Php and MySql
Penerapan Data Mining Dalam Menganalisa Pola Peminjaman Buku di Perpustakaan SMP Negeri 2 Beringin Satu Atap Menggunakan Algoritma Apriori Kristiani Romili Sitanggang; Penda Sudarto Hasugian
Jurnal Ilmu Komputer dan Sistem Informasi (JIKOMSI) Vol. 1 No. 1 (2018): Jurnal Ilmu Komputer dan Sistem Informasi
Publisher : Sisfokomtek

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.9767/jikomsi.v1i1.16

Abstract

The library is a facility that provides information, sources of knowledge, and tools for learning. All this time,in the library of the One Roof One-Banyan One-Roof Junior Secondary School, in book lending transactions,they are only stored without any further data processing. In fact, the large amount of lending transaction datacan be used to find out the association rules between two or more books. To facilitate the process of borrowingbooks in a library, especially in terms of finding books to be borrowed, Apriori algorithm with the associationrules (association rules) so that information can be extracted about what books are often borrowed and knowthe pattern of the relationship between books that have been borrowed together so that later can be used tomake the preparation of books in accordance with the existing book lending patterns so can facilitate libraryvisitors in the process of finding books
Penerapan Data Mining Dalam Menganalisa Pola Peminjaman Buku di Perpustakaan SMP Negeri 2 Beringin Satu Atap Menggunakan Algoritma Apriori Kristiani Romili Sitanggang; Penda Sudarto Hasugian
Jurnal Ilmu Komputer dan Sistem Informasi (JIKOMSI) Vol. 1 No. 2 (2018): Jurnal Ilmu Komputer dan Sistem Informasi (JIKOMSI)
Publisher : Sisfokomtek

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.9767/jikomsi.v1i2.169

Abstract

Perpustakaan adalah salah satu fasilitas penyedia informasi, sumber ilmu pengetahuan, dan sarana untuk belajar. Selama ini di Perpustakaan SMP Negeri 2 Beringin Satu Atap di dalam transaksi peminjaman buku hanya disimpan begitu saja tanpa ada pengolahan data lebih lanjut. Padahal, banyaknya jumlah data transaksi peminjaman tersebut bisa digunakan untuk mengetahui aturan asosiasi antara dua buku atau lebih. Untuk memudahkan proses peminjaman buku di perpustakaan terutama dalam hal pencarian buku yang akan dipinjam, Algoritma Apriori dengan aturan asosiasi (association rules) sehingga dapat digali informasi tentang buku-buku apa yang sering dipinjam dan mengetahui pola hubungan antara buku yang telah dipinjam secara bersama-sama sehingga nantinya dapat dimanfaatkan untuk melakukan penyusunan buku sesuai dengan pola peminjaman buku yang ada sehingga dapat mempermudah para pengun-jung perpustakaan dalam proses pencarian buku
Analisa Metode Least Significant Bit Dalam Penyisipan Pesan Terenkripsi Terhadap Citra Digital: Analysis of the Least Significant Bit Method in Inserting Encrypted Messages against Digital Images Penda Sudarto Hasugian
Journal of Computer Networks, Architecture and High Performance Computing Vol. 1 No. 1 (2019): Computer Networks, Architecture and High Performance Computing
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnapc.v1i1.45

Abstract

Berkembangnya jaringan komunikasi membuat pertukaran informasi semakin sering terjadi, baik dalam bentuk teks, audio, dan video. Semakin banyaknya pesan yang yang ingin dikirimkan maka keamanan dan kerahasiaan dari pesan tersebut semakin sulit dijaga. Keamanan dan kerahasiaan adalah aspek yang penting pada proses pertukaran informasi atau pesan. Untuk melindungi kerahasiaan pesan bisa menggunakan teknik kriptografi. Kriptografi adalah ilmu yang mempelajari teknik – teknik matematika yang berhubungan dengan aspek keamanan seperti kerahasiaan, integritas data, serta otentikasi. Sedangkan Steganografi adalah salah satu teknik yang dilakukan dalam mengamankan pesan yaitu dengan cara menyembunyikan pesan ke sebuah media digital. Pada penelitian ini dilakukan analisis untuk mengimplementasikan keamanan file txt dan rtf dengan kombinasi algoritma kriptografi One Time Pad dengan steganografi least significant bit (LSB). Pada tahap kriptografi pesan yang telah berhasil diinput akan dienkripsi dengan kunci yang telah diberikan kemudian dilanjutkan dengan proses penyisipan pesan di tahap steganografi.. Pesan yang dapat dibaca oleh sistem adalah pesan berformat .txt dan .rtf. Pada Algoritma LSB penyisipan dilakukan dengan menggantikan bit terakhir citra dengan bit pesan yang akan disisipkan. Pada tahap enkripsi dan penyisipan akan dihasilkan stego image, stego image merupakan citra yang sudah disisip oleh pesan. Kemudian pada tahap ekstraksi dan dekripsi yang dihasilkan adalah plaintext, plaintext merupakan pesan yang belum diberikan kunci apapun.
Decision Support System of The People's Business Credit Method Using Analytical Hierarchy Process at Bank Syariah Mandiri Kc. Lubuk Pakam Dhini Andika; Penda Sudarto Hasugian
Journal of Computer Networks, Architecture and High Performance Computing Vol. 2 No. 1 (2020): Computer Networks, Architecture and High Performance Computing
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnapc.v2i1.371

Abstract

Decision support system (DSS) system that can help someone in making decisions that are accurate and right on target. Many problems can be solved by using the SPK. One of them is Determining the eligibility of customers receiving the People's Business Credit (KUR). There are Several methods that can be used in building a DSS, Including Analytical Hierarchy Process (AHP). The application of the AHP method to the decision support system of people's business credit through a number of processes of data transformation starts from Determining the priority scale of each criterion, to getting the final grade and ranking. In Determining the eligibility of KUR recipient customers, there are Several criteria that are the basis for decision making, Including Credit Status, Productive Business, Business Conditions, Collateral and Collectibility.
Expert System Diagnoses Damage to Injection Motorcycles with the Certainty Factor Method Feryanto Ginting; Penda Sudarto Hasugian
Journal of Computer Networks, Architecture and High Performance Computing Vol. 2 No. 1 (2020): Computer Networks, Architecture and High Performance Computing
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnapc.v2i1.372

Abstract

Motorcycles are the main means of transportation that is widely used to support the activities of their societies. Prior to the development of technology, motorcycles still use carburetors. But motorcycles are still using carburetor system is still quite wasteful. With the development of technology, there is now applying the Yamaha brand motorcycles capable of supplying petrol injection engine needs. Motorcycles injection technology is much more efficient compared to motorcycle carburetor technology, in addition to economical motorcycle of this type has a performance engine and a reliable power. But frequent obstacles that cause damage to the injection Yamaha motorcycle, disrupting users.An expert system is a system that adopts the expertise of an expert an expert in a particular field into the system or a computer program is presented with a display that can be used by a user who is not an expert so that system users can make a decision or set policy like an expert in finishing problem. Certainty factor method used to obtain the value of the certainty of damage from an expert motorcycle injection, so that the user also gets the value of the damage certainty selected symptoms of the experience of experts. The results of diagnostics in expert system that has been made that if the user mencheklis symptoms such as clogged when rotated gas engine, electric distater difficult / lift, lights up when the engine is difficult to use the kick starter, often emit exhaust sound of an explosion, it can be concluded from the analysis that the damage found on the spark plug with a value of MB = 0.99, MD = 0:22 and Certainty Factor value of 76.66%. The diagnosis ever made by a visitor or mechanical accessible again by entering an email to the database.