Claim Missing Document
Check
Articles

Found 16 Documents
Search

Perancangan Alat Monitoring Pendeteksi Suara di Ruangan Bayi RS Vita Insani Berbasis Arduino Menggunakan Buzzer Handri Al Fani; Sumarno Sumarno; Jalaluddin Jalaluddin; Dedy Hartama; Indra Gunawan
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 4, No 1 (2020): Januari 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v4i1.1750

Abstract

Mining age and technology have led to the emergence of an innovation that can help facilitate human activities, especially for parents in controlling and looking after babies. By implementing a sound monitoring system in the baby room based on the Arduino Atmega 328 microcontroller which functions to detect noise. Data from the voice sensor is processed by Arduino via a pin. So Arduino will give instructions to Buzzer to send alarm notifications
Penerapan Jaringan Syaraf Tiruan Dengan Metode Backpropagation Untuk Memprediksi Penjualan Sepeda Motor Yamaha Di Asli Motor Siantar Muhammad Fajar; Sumarno Sumarno; Indra Gunawan
KLIK: Kajian Ilmiah Informatika dan Komputer Vol. 1 No. 4 (2021): Februari 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The research was conducted at CV. ORIGINAL SIANTAR MOTORS that have a problem, namely the lack of sales is a very bad thing for the CV because it results in the economy and the turnover of motorbike sales capital is not good. This problem can be overcome by using the Backpropagation method which is usually used by multilayer networks to minimize errors in the output by testing data using Matlab 6.1. The purpose of this research is expected that using this method can increase the number of sales of motorbikes in each type, and increase the economic income for employees who work at the CV in the form of bonuses. The results of this study are to estimate the highest type of motorcycle sales in 2020 using sales data for 2017, 2018 and 2019.
Prediksi Promosi Jabatan Karyawan JNE Pematangsiantar Dengan Algoritma C4.5 Rizki Ananda; Sumarno Sumarno; Indra Gunawan
Jurnal Sistem Komputer dan Informatika (JSON) Vol 3, No 3 (2022): Maret 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v3i3.3763

Abstract

This study predicts employee promotions using employee data from PT. JNE Pematangsiantar. The purpose of this research is to obtain a rule model in classifying predictions of promotions in the company. By knowing this prediction, decision makers can choose employees who will be promoted according to the rules that apply in the company. The method used in this research is Data Mining Algorithm C4.5, with employee data used as many as 20 employees. The variables used in this study include: Job Knowledge, Competence, Teamwork, Communication and Job Quality. The results of the study obtained 9 rules or rule models for this prediction classification with 5 rules with the final result being Promoted and 4 rules with the final result not being Promoted. With an accuracy rate of 71.43% and a classification error of 28.57%
Penerapan Metode Fuzzy Mamdani Dalam Penentuan Penerima BLT-DD Di Mekar Sari Raya Muhammad Aliyul Amri; Dedy Hartama; Anjar Wanto; Sumarno Sumarno; Heru Satria Tambunan
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 4, No 1 (2020): The Liberty of Thinking and Innovation
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v4i1.2698

Abstract

Abstract−BLT-DD, which stands for Village Fund Direct Cash Assistance, is a village assistance program with the type of cash or assistance or various other types of assistance, whether conditional or unconditional for underprivileged people. The selection of BLT-DD recipients needs to be done accurately so that recipients who really need will receive BLT-DD. To be able to determine the BLT-DD recipient, one of artificial intelligence is needed, namely fuzzy mamdani logic which has a simple structure using min-max or max-product operations with a set of predetermined rules, namely IF-AND-THEN. Then supported by the Matlab application (R2007b) as a decision maker through the program provided. The results of the calculation of BLT-DD recipients can later assist the Village Head and staff staff in determining more accurate BLT-DD recipients.Keywords: Fuzzy, Mamdani, Receiver, BLT-DD, Matlab[1]        D. Rahakbauw, F. Rianekuay dan Y. Lesnussa, “Penerapan Metode Fuzzy Mamdani Untuk Memprediksi Jumlah Produksi (Studi Kasus : Data Persediaan Dan Permintaan Produksi Karet Pada PTP Nusantara XIV (Persero) Kebun Awaya, Teluk Elpaputih, Maluku-Indonesia,” Jurnal Ilmiah Matematika dan Terapan (JIMT), pp. 119-127, 2019. [2]        Z. Julisman dan Erlin, “Prediksi Tingkat Curah Hujan di Kota Pekanbaru menggunakan Logika Fuzzy Mamdani,” Jurnal SATIN (Sains dan Teknologi Informasi), vol. 3, pp. 65-72, 2014. [3]        N. Ningsih, N. T. Pambudi dan A. M. Abadi, “Penerapan Metode Fuzzy Mamdani Untuk Memprediksi Penjualan Gula,” Seminar Matematika Dan Pendidikan Matematika UNY, pp. 153-160, 2017. [4]        B. Prasetya, A. B. Setiawan dan B. F. Hidayatulail, “Fuzzy Mamdani Pada Tanaman Tomat Hidroponik (Mamdani Fuzzy on Hydroponics Tomato Plants),” Journal of Electrical and Electonic Engineering (UMSIDA), vol. 3, pp. 228-263, 2019. [5]        M. S. Asih, “Sistem Pendukung Keputusan Fuzzy Mamdani pada Alat Penyiraman Tanaman Otomatis,” Jurnal Sistem Informasi (QUERY), vol. 2, pp. 41-52, 2018. [6]        M. Y. T. Irsan, M. I. Kasau dan I. P. Simbolon, “Penggunaan Fuzzy Logic & Metode Mamdani untuk Menghitung Pembelian, Penjualan dan Persediaan,” Journal of Applied Accounting and Finance (JAAF), vol. 3, pp. 37-48, 2019.
Implementasi Algoritma Advanced Encryption Standard dalam Pengamanan Data Penjualan Ramayana Department Store Sunil Setti; Indra Gunawan; Bahrudi Efendi Damanik; Sumarno Sumarno; Ika Okta Kirana
JURIKOM (Jurnal Riset Komputer) Vol 7, No 1 (2020): Februari 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (560.475 KB) | DOI: 10.30865/jurikom.v7i1.1960

Abstract

Ramayana Department Store is one of the companies engaged in the business of retail supermarket. The company uses computer science technology applied in servicing activities, particularly in the sales data storage. Sales data is the information generated from sales transaction activities that obtained by the company through marketing activities to make profits. The use of computers in storing sales data is used to improve data security so that the valuable information can be confidentiality guaranteed. To avoid data theft and data manipulation,we need to implement a security system. Cryptography is a science that uses mathematical equations to keep the information secure such as data confidentiality, data validity, data integrity, and data authentication. A method that can be used to secure messages / information is the Advanced Encryption Standard (AES). The application of the AES cryptography algorithm in securing the sales data of the Ramayana Department Store shows that the algorithm can make encryption that cannot be read or understood by humans and make decryption that exactly same with the initial plaintext input. The difference of the key and the size of a file also affecting the time required to perform the encryption and decryption process
Implementasi Access Control List Pada Mikrotik dalam Mengamankan Koneksi Internet Koperasi Sumber Dana Mutiara Bil Klinton Sihotang; Sumarno Sumarno; Bahrudi Efendi Damanik
JURIKOM (Jurnal Riset Komputer) Vol 7, No 2 (2020): April 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (331.472 KB) | DOI: 10.30865/jurikom.v7i2.2010

Abstract

The need for information and internet access at this time is very high. To accept it is wrong only with computer networks as a medium. In a network that requires a network that has been segmented using a Virtual Local Area Network (VLAN), the application of an Access Control List (ACL) is required to be granted access rights for each device in the network. The Access Control List (ACL) can filter the data traffic of a network by controlling whether the packets are passed or issued. A network is built using several different network devices, one of which is a router. A router is a tool that can process different data packet networks (between networks) through a process called routing. lots of companies that produce routers, mikrotik is one of the companies that produce routers. mikrotik is easy to do because it uses Winbox in Gui's view, besides that the hotspot server in it is provided with several management facilities that can be arranged according to network requirements