Claim Missing Document
Check
Articles

Found 38 Documents
Search

Implementasi Metode Viola Jones Untuk Perancangan Sistem Pemantauan Tempat Parkir Berdasarkan Digital Image Processing Tonggam Harado Wilson Sinaga; Sinar Sinurat
Bulletin of Multi-Disciplinary Science and Applied Technology Vol 1 No 2 (2022): Februari 2022
Publisher : Forum Kerja Sama Penddikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (255.311 KB)

Abstract

Image processing is image processing, which aims to improve image quality so that it can be easily interpreted by humans or machines. Image processing techniques transform images into other images. Image processing can be used in various fields, one of which is in terms of accessing the parking lot using the viola jones method. Viola-Jones applies the Adaboost (adaptive boosting) algorithm which can improve detection performance. The process of monitoring available and empty parking spaces using the Viola-Jones method is to classify objects in the image based on some simple feature values. There are several reasons to use these features instead of doing the filter process directly. The most basic reason is that the feature is a feature-based operating system so it's much faster than a pixel-based system. The image classification process is based on the value of a feature. The output is in the form of information about vacant parking locations and occupied parking lots.
Penerapan Algoritma Xtea Dengan Metode Pembangkitan Kunci Linear Congruential Generator Untuk Pengamanan Teks Rahasia Nusra Anwar; Sinar Sinurat; Imam Saputra
Resolusi : Rekayasa Teknik Informatika dan Informasi Vol. 2 No. 3 (2022): RESOLUSI Januari 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Confidential text data is very vulnerable to wiretapping by irresponsible parties. The text is still plaintext, making it easier for the attacker to make use of it. Text data can be secured by several techniques. One of them is cryptographic techniques. Cryptographic techniques can secure secret text data by randomizing the hex value of the data into a data that cannot be recognized and read. One of the reliable algorithms is the eXtended Tiny Encryption Algorithm (XTEA) symmetry algorithm. The XTEA algorithm is a simple algorithm that is lightweight and fast in the encryption and decryption process. However, the concept of the symmetry algorithm is the encryption and decryption process using the same key. The security of this concept is very vulnerable if the key is leaked and is public. So that this can be optimized by generating keys using the Linear Congruential Generator (LCG) method. Key generation is used with prime numbers. The key sent to an eligible recipient is only the initial prime number. So that the recipient has to do key assembly first to carry out the decryption process. This can optimize the encrypted ciphertext using the XTEA algorithm.
Peningkatan Kualitas Citra Termal Menggunakan Metode Blind Deconvolution Mita Erlida Sipahutar; Sinar Sinurat; Imam Saputra
Building of Informatics, Technology and Science (BITS) Vol 3 No 2 (2021): September 2021
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (425.579 KB) | DOI: 10.47065/bits.v3i2.133

Abstract

Temperature is a quantity that indicates the degree of heat of an object. The higher the temperature of an object, the hotter the object. Thermal imagery is an image created with thermal infrared spectrum that utilizes the temperature of an object. Sensing on this spectrum is based on differences in the temperature of the object and its emission power in the image which is reflected by the difference in hue or color. The sensor used in thermal images is noncamera based on scanning. In thermal imagery, there is a problem, namely blurred / blurred images that make it difficult to obtain information about objects. Blurred thermal images are caused by hot spots or rising temperatures. Thermal images often experience problems due to the large amount of diffraction fog in thermal imaging caused by the refractive index decreases as the wavelength increases. Blind deconvolution is a method that can be used to restore images that experience blur effects without having to know the value of the Point Spread Function (PSF). The process of improving the quality of thermal images is carried out using the blind deconvolution method which consists of 3 stages, namely finding the kernel value, looking for the convolution and estimation values ( ). Blind deconvolution method can be applied in improving the quality of thermal images by reducing the blur effect found in the image
Penerapan Metode Gabor Wavelet Dalam Pengenalan Wajah Pada Rekaman CCTV Sofi Andianis Fau; Sinar Sinurat
Journal of Informatics Management and Information Technology Vol. 1 No. 4 (2021): October 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i4.129

Abstract

Human facial recognition is an important field of research, and there are many applications today that can apply it. Through the development of a technique such as the Gabor Wavelet, computers can now outpace the human brain in a variety of tasks in facial recognition, particularly those that require searching large facial databases. The face recognition system is used to compare an input face image with a face database and produce the face that best matches that image if detected. Meanwhile, face authentication is used to test the authenticity / similarity of a face with face data that has been stored in the previous database. Applications have advantages over conventional methods. In case it is not easily stolen or used by unauthorized users. The purpose of this final project is to create a facial recognition software from CCTV footage using Gabor Wavelet to reduce the dimensions of facial images as well as to determine the capabilities of the technique. In this final project, the software created uses a still image as input. To build this application using Matlab. The system test results show that the use of Gabor Wavelet for facial recognition on CCTV footage provides a fairly high level of accuracy. Test results The results obtained will then be entered into the Gabor Wavelet Method to determine the identity of the face owner. For facial images that were included in the exercise, it was possible to get 85.71% correct identification
Modifikasi Algoritma XTEA dengan Pembangkitan Kunci Menggunakan Metode Linear Congruential Untuk Pengamanan File Dokumen Berliana Oktaviani Sinaga; Sinar Sinurat; Taronisokhi Zebua
Journal of Informatics Management and Information Technology Vol. 1 No. 4 (2021): October 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i4.130

Abstract

Confidential document files must have security both when the file process is sent or stored in the stroge media. This is done so that the confidential document file is not known by someone who does not have authority over the file, or to avoid loss if the file falls into the wrong hands. In order to achieve this, a document file security technique is needed that can convert document file data into unrecognized data. One of the techniques that can be used is cryptography. Cryptography makes use of algorithms to encode document files with an encryption process, and restore document files with a decryption process. One of the algorithms that can be used is the XTEA algorithm. XTEA divides the document file string into 2 parts, namely AL 32 bit and BL 32 bit. The weakness of the XTEA algorithm when carrying out the encryption or decryption process with repeated key scheduling so that it is not effective in optimizing the security of encrypted document files, therefore in this study the Linear Congruential Generator (LCG) method is added to generate XTEA keys. LCG has values ??a, c, m and X0 which triggers to get the XTEA key. So that in the process of distributing encrypted document files, the key sent is the LCG trigger value in the form of a, c, m and X0, if the value is known by the attacker, the encrypted document file cannot be returned. So that the results of the XTEA encryption algorithm with key optimizer based on the LCG method produce a document file cipher that is more optimal in security
IMPLEMENTATION OF SINGULAR VALUE DECOMPOSITION FOR ADDING WATERMARK ON TEXT DOCUMENTS Sinar Sinurat; Edward R Siagian; Pilipus Tarigan
INFOKUM Vol. 10 No. 02 (2022): Juni, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (373.101 KB)

Abstract

Watermark is a part of steganography that is used by many users in electronic and non-electronic documents. Watermark certainly does not guarantee the safe use or modification of the document, but only the legitimacy of ownership of the document. Watermarking is a part of steganography that is used by many users in electronic and non-electronic documents. Watermarking certainly does not guarantee the safe use or modification of the document, but only the legitimacy of ownership of the document. Establishing a digital watermark will improve the owner's document security. Hiding a label by inserting datum bits in the image segment using Singular Value Decomposition (SVD), as a part of Watermarking. Watermark domains are digital documents in the form of videos, images, text, sound. Watermarking applications built by applying singular value decomposition to numbers
IMPLEMENTASI DATA MINING DENGAN METODE REGRESI LINEAR BERGANDA UNTUK MEMPREDIKSI DATA PERSEDIAAN BUKU PADA PT. YUDHISTIRA GHALIA INDONESIA AREA SUMATERA UTARA Indah Lestari Lumban Gaol; Sinar Sinurat; Edward Robinson Siagian
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1579

Abstract

PT. Yudhistira Ghalia North Sumatra. Where Inventory (stock) of goods is an important thing in a company for data collection or checking activities in order to find out the amount of goods that are used up and goods that will be needed in a company. Inventory of goods is always needed in company activities. So that in the supply of books has been delayed for making stock and excess stock making of books. In this study, multiple linear regression method will be used to predict book inventory data. So for that we need to predict book inventory data for the future how many books should be in stock. Multiple linear regression algorithm has advantages such as generalizing and extracting from certain data patterns, being able to acquire knowledge even though there is no certainty, and being able to do calculations in parallel so that the process is shorter. After being predicted, it will be possible to produce results that can be used in the future so that it can help PT. Yudhistira especially the part of the inventory of goods which must be provided in the following month.Keywords: Data Mining, Inventory, Multiple Linear Regression Algorithms
IMPLEMENTASI ALGORITMA ADVANCED ENCRYPTION STANDARD DAN TRIPLE DATA ENCRYPTION STANDARD UNTUK MENGAMANKAN CITRA DIGITAL Mahadi Winafil; Sinar Sinurat; Taronisokhi Zebua
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 2, No 1 (2018): Peranan Teknologi dan Informasi Terhadap Peningkatan Sumber Daya Manusia di Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v2i1.975

Abstract

Digital images that are personal and confidential are very vulnerable to wiretapping by irresponsible parties. Especially if distributed via the internet network such as on Facebook, WhatsApp and e-mail chat based applications. Images that are sent sometimes are often confidential images and must be maintained. In order to maintain the security of digital images can be done by utilizing cryptographic techniques. Cryptographic techniques can secure digital images by changing pixel values from digital images so as to produce different pixel values from the original image to be secured. This research will use AES 128 bit and Triple DES methods for encryption and decryption of digital images on client-server based applications. The results of the encryption AES algorithm will be re-encrypted with the Triple DES Algorithm so as to produce pixel values that are far different from the original pixel values. Keywords: cryptography, image, AES, Triple DES
Sistem Pendukung Keputusan Seleksi Instruktur Pada LKP Karya Prima Menggunakan Metode TOPSIS Yitro Moarota Harefa; Sinar Sinurat
Bulletin of Information Technology (BIT) Vol 1 No 2: Juli 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1038.434 KB)

Abstract

LKP Karya Prima is one of the courses and training institutions that has worked closely with several companies to provide quality instructors. To solve the above problems, it is necessary to design an application of a decision support system to assist management in selecting outstanding instructors. Decision Support System (SPK) is used as an alternative application system that helps in making decisions for the determination of outstanding instructors. The process of determining the instructor with precision followed by the availability of more than a few classes that meet certain criteria is including the problem of Multiple Criteria Decision Making (MCDM) TOPSIS, with the application of the TOPSIS method makes management easier to make decisions.
QUALITY AND POPULARITY PREDICTION MODELING OF TV PROGRAMME THROUGH FUZZY QFD Minarya Sitepu; Sinar Sinurat; Anggiat Hatuaon Sihite
JURIKOM (Jurnal Riset Komputer) Vol 3, No 6 (2016): Desember 2016
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (312.32 KB) | DOI: 10.30865/jurikom.v3i6.181

Abstract

Firstly the researcher want to look how the society interactive one of another. Nowdays TV Program one of facilitate can accommodate us to look , how people make interactive like what we call in Indonesia costum as: arisan, gossip, candaan group etc. a social phenomenon like that can be wrapped in miniature setting mostly in Joke or Comedian theme. Recently one of fumous like Sule “Ini Talk Show” TV Program. “Ini Talk Show” make one of TV production part of them contribute on TV Program needed to know as a practice, comedian society and as a prediction value. Sometimes the people who contributing for this production want to know how to get measuring  increase of this program, may be in reputation, interest and benefit for investment. Base on above description the researcher try to finding a simple method to get the element which make this program can be increased as a quantitative or qualitative base on the survey for 40 people in one area and after that making questionnaire for the measuring and the result. The researcher get 3 domain area which grouped as : popularity factor, entertainment factor and regional factor.