Claim Missing Document
Check
Articles

Found 38 Documents
Search

Determining The Amount Of Tuition Fees For New Budidarma Students With Data Mining Using The K-Means Clustering Algorithm Sinar Sinurat
Jurnal Info Sains : Informatika dan Sains Vol. 15 No. 01 (2025): Informatika dan Sains , 2025
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

One of the variables that determines the quality of education in higher education is the amount of fixed tuition fees that must be paid by students to the academic community, which must be in sync with their parents' income. Although the quality of education can be measured from the consistency of supervision, compliance of teachers and students with the System Operating Procedure (SOP), and the availability of complete teaching and learning infrastructure. In private universities, to determine fixed tuition fees, one method that can be used is to find patterns or information on fixed tuition fees at other private universities in the same area (region) by drawing from a large database, which is data mining. It is very important for a private university to know the patterns of prospective students from the data in the database owned by a campus. This technique is the K-Means Clustering Algorithm. The results of the discussion will describe the amount of affordable tuition fees that will be provided with a list with variations based on the study program chosen by prospective students, where each department is distinguished by the completeness of administration and infrastructure in the study program.
Penerapan Algoritma Salsa20 Untuk Mengamankan Sandi Akun Virtual Hasibuan, Muhammad Abdul Rasyid; Sinurat, Sinar
MEANS (Media Informasi Analisa dan Sistem) Volume 9 Nomor 2
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The application of the SALSA20 algorithm in securing virtual account passwords aims to increase the security of users' personal data in an increasingly complex digital era. The SALSA20 algorithm, which is known as one of the efficient and secure stream cipher algorithms, has superior characteristics in terms of speed and resistance to cryptanalysis attacks. This research explores the implementation of SALSA20 in a virtual account password security system, testing the performance of this algorithm under various conditions and comparing it with other commonly used cryptographic algorithms, such as AES (Advanced Encryption Standard). The research results show that SALSA20 is able to provide a high level of security with a faster execution time compared to several other algorithms. Testing includes analysis of encryption and decryption speed, system resource usage, as well as resistance to various types of attacks, such as brute force and differential analysis attacks. In addition, the integration of SALSA20 in real applications shows that this algorithm is easy to implement and provides significant protection against attempts to steal user passwords and personal data.
Application of Preference Selection Index (PSI) Method for Decision Support System in Evaluating Supervisor Candidates of the Kitchen Department at Grand Antares Hotel Hutahaean, Yosefa Fras; Sinurat, Sinar; Syahputra, Ridwa
Jurnal Multimedia dan Teknologi Informasi (Jatilima) Vol. 7 No. 03 (2025): Jatilima : Jurnal Multimedia Dan Teknologi Informasi
Publisher : Cattleya Darmaya Fortuna

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54209/jatilima.v7i03.1677

Abstract

In the Supervisor Candidate Assessment at the Grand Antares Hotel, the criteria used to determine Supervisor Candidates at the Grand Antares Hotel are made based on criteria. Based on the results of the research that has been conducted, the Preference Selection Index Method is applied in the assessment of supervisor candidates who will be appointed as supervisors, then 4 criteria are determined: Education, Skills, Work Experience. GPA Data analysis is carried out so that criteria can be determined from existing alternatives and weighted using the Preference Selection Index (PSI) Method.
Implementasi Metode MAUT Dengan Pembobotan ROC Pada Sistem Pendukung Keputusan Penerimaan Calon Karyawan Baru Laia, Dedi Verianto; Sinurat, Sinar; Ndruru, Eferoni
JURNAL RISET KOMPUTER (JURIKOM) Vol. 11 No. 5 (2024): Oktober 2024
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v11i5.8469

Abstract

Karyawan merupakan aset utama perusahaan yang menjadi perencana dan pelaku aktif dari aktivitas organisasi dimana Sistem Pendukung Keputusan adalah sistem yang membantu dalam memberikan hasil yang lebih maksimal, dimana terdapat beberapa metode dalam pengambilan keputusan, salah satunya adalah metode Multi Attribute Utility Theory (MAUT) yang berfungsi menentukan perangkingan yang dimana hasil perangkingan dari data calon karyawan baru digunakan sebagai keputusan, namun terdapat kekurangan MAUT ini karena tidak adanya bobot kriteria yang pasti dari PT. Binavalasindo Dolarasia Sejahtera Utama, sehingga dibutuhkan metode Rank Order Centroid (ROC) dalam menentukan pembobotan, yang dimana ROC digunakan untu mengevaluasi kinerja model klasifikasi dalam memprediksi kelas atau kejadian tertentu. Berdasarkan hasil penelitian yang telah diujikan, maka peneliti dapat memberikan kesimpulan bahwa penerimaan calon karyawan baru dengan menggunakan metode MAUT dengan 7 nama alternatif  dengan 5 kriteria dan nilai bobot yang didapatkan dengan metode ROC dengan hasil nilai tertinggi oleh Alfendy Yatatema Dawolo dengan alternatif A5 nilai 0,832 dan nilai terendah oleh Dharma Alfian Purba dengan alternatif A3 dengan hasil nilai 0,097. Pembobotan mengunakan metode ROC menjadikan penilaian lebih objektif karena sistem perhitungan nilai bobot dengan metode ROC mengurutkan dengan otomatis berdasarkan peringkat kepentingan kriteria.
PERBANDINGAN METODE AHP DAN MAUT PADA SISTEM PENDUKUNG KEPUTUSAN PEMILIHAN GURU TERBAIK DI MAS DARUL MUTAALIMIN TANAH MERAH KEC. GUNUNG MERIAH KAB. ACEH SINGKIL Munte, Joni; Sinar Sinurat; Murdani
Pendas : Jurnal Ilmiah Pendidikan Dasar Vol. 9 No. 04 (2024): Volume 09, No. 04 Desember 2024
Publisher : Program Studi Pendidikan Guru Sekolah Dasar FKIP Universitas Pasundan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23969/jp.v9i4.17973

Abstract

The best teachers are those with profound knowledge and the ability to inspire and motivate their students. Teachers are also unsung heroes who pave the way for acquiring knowledge. Therefore, their role is crucial in educating the next generation to advance the nation. This research aims to identify the best teachers by comparing decision support system methods, specifically AHP and MAUT, to assist schools in selecting the best teachers. The study develops a system to facilitate the determination of the best teacher based on criteria set by the school. The research not only compares the two methods but also uses suitability formulas to determine the most appropriate method. With this decision support system and the methods employed, it is hoped that the MAS Darul Muta’alimin Tanah Merah will be better equipped to make decisions regarding the selection of the best teacher.
PERBANDINGAN KINERJA ALGORITMA GOLOMB CODE DAN TABOO CODE PADA KOMPRESI FILE MP4 Megawati; Sinurat, Sinar; Ulfa, Kurnia
Pendas : Jurnal Ilmiah Pendidikan Dasar Vol. 9 No. 04 (2024): Volume 09, Nomor 04, Desember 2024
Publisher : Program Studi Pendidikan Guru Sekolah Dasar FKIP Universitas Pasundan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23969/jp.v9i04.18123

Abstract

File compression is a crucial technique in data processing for reducing file size without sacrificing data quality. Effective compression algorithms not only reduce file size but also maintain data integrity. This study compares the performance of two compression algorithms, Golomb Code and Taboo Code, in the context of MP4 file compression. Golomb Code is an efficient compression algorithm for data with geometric distribution, commonly used in lossless compression. Taboo Code is a newer compression algorithm designed to address some limitations of traditional compression methods by using more adaptive and flexible encoding techniques. The study evaluates the performance of both algorithms based on several metrics, including compression ratio, compression speed, and quality of the compressed file. Experiments were conducted on a range of MP4 files with varying sizes and content to achieve comprehensive results and better generalization. The findings indicate that each algorithm has its own strengths and weaknesses. Golomb Code performs better with files that have more regular data patterns and data distributions that align with the algorithm's assumptions. In contrast, Taboo Code excels in flexibility and adaptability with files that have more complex and irregular data patterns.
IMPLEMENTASI ALGORITMA TRANSPOSISI RAIL FENCE CIPHER UNTUK PENGAMANAN VIRTUAL ACCOUNT Siagian, Widyanti Masintan; Sinurat, Sinar; Sinaga, Sony Bahagia
Pendas : Jurnal Ilmiah Pendidikan Dasar Vol. 9 No. 04 (2024): Volume 09, Nomor 04, Desember 2024
Publisher : Program Studi Pendidikan Guru Sekolah Dasar FKIP Universitas Pasundan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23969/jp.v9i04.18129

Abstract

The rapid advancement of information technology has made information a fundamental need for everyone. With the progression of technology, the security of data and information exchanged is increasingly important. To manage virtual accounts, especially regarding security, a password is essential. Passwords are required for transactions, accessing account information, or making changes to virtual account settings. The security procedures for virtual account passwords can vary depending on the service provider or financial institution managing the virtual account. This research aims to investigate the use of one cryptographic algorithm, Rail Fence transposition, in securing supplier data. The study employs an experimental approach using supplier data to simulate the application of Rail Fence transposition. This research contributes to the application of encryption to protect supplier databases. Overall, the results indicate that the Rail Fence method can be effectively implemented to enhance the security of supplier data within a company.
Pengenalan Teknologi Informasi Untuk Generasi Milenial di SMK Swasta Nurcahaya Medan Sinar Sinurat; Eferoni Ndururu; Riswan Limbong
JPM: Jurnal Pengabdian Masyarakat Vol. 3 No. 3 (2023): January 2023
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jpm.v3i4.734

Abstract

The introduction of technology to the millennial generation is very behind in making good use of technology. Most millennials use technology incorrectly. In terms of information technology is very helpful in supporting learning and being able to interact with others. And most people misuse information technology properly and many are still not familiar with the components used in building information technology such as hardware, software and types of technology. It causes misuse of devices or types of technology