Claim Missing Document
Check
Articles

Analisis Penggunaan Algoritma Nguyen Widrow Dalam Back Propagation Pada Penyakit Ginjal Analisys of use of nguyen widrow algorithm on backpropagation for identification of Kidney disease Damanik, Romanus
SAMUDERA Vol 8, No 1 (2014)
Publisher : Universitas Malikussaleh

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Pada penelitian ini penulis menggunakan algoritma Nguyen Widrow didalam Jaringan Syaraf Tiruan (JST) Backpropagation untuk pengenalan (recognition) gejala atau pola penyakit ginjal dan mempercepat mekanisme pembelajaran (training) berdasarkan gejala atau pola penyakit ginjal. Jaringan Syaraf Tiruan (JST) Backpropagation merupakan algoritma pembelajaran yang bersifat supervisi (supervised learning), yaitu pembelajaran yang membutuhkan pengawasan untuk pembelajarannya. didalam Jaringan Syaraf Tiruan (JST) Backpropagation terdapat data masukan (input) dan data keluaran (output) yang dipakai dalam pelatihan (training) sehingga diperoleh bobot (weight) yaitu dari unit masukan (Input) ke layer tersembunyi (Hidden Layer) dan dari layer tersembunyi (hidden layer) ke layer keluaran (Output). Pada penelitian ini, pengenalan pola penyakit ginjal terdapat 30 (tiga puluh) gejala dan 10 (sepuluh) macam penyakit ginjal. Data masukan (input) secara acak (random) dan data dilatih (training) menggunakan algoritma backpropagation yang pembobotannya menggunakan Nguyen Widrow. Dari penelitian yang dilakukan, keunggulan dari Jaringan Syaraf Tiruan (JST) Backpropagation secara acak lebih cepat dalam melakukan pelatihan (training) sedangkan dalam hal pengenalan (recognition) gejala atau pola penyakit ginjal algoritma Nguyen Widrow jauh lebih baik.
PERANGKAT LUNAK KRIPTOGRAFI FILE TEKS MENJADI BENTUK CITRA DIGITAL MENGGUNAKAN METODE KERBEROS Damanik, Romanus
Journal Information System Development (ISD) Vol 2, No 1 (2017): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Rapid development of current computer technology often lead to abuse of the technology in a criminal action. One of the most common is the theft of the Password (password), personal accounts until confidential documents. To that end, the perceived need for a form of safeguard against the things above in order to comfort the user in using computer technology. Encryption is one method to randomize the words so that it cannot be read and understood by anyone else except by users who use them and those who were given the right to use it. The Kerberos method is a method of encryption that originally applied to secure a computer network. Kerberos authentication works by comparing input data with the given keywords. Based on the workings of the Kerberos method, be designed a device for data security in the form of a text message is converted into the form of a digital image. Through the processing of Binary value from the message text inputed. will be generated a digital image is the result of a binary-binary encryption of text messages through the Kerberos method. This type of data security is more secure than cryptography that produce the same output with the Plaintext, such as cryptographic text messages that generate output in the form of a digital berbedayaitucitra denganbentuk message.Keywords:  Cryptography, Kerberos, Conversion, Digital Image
SISTEM PAKAR DIAGNOSA PENYAKIT MENULAR PADA BALITA DENGAN METODE BAYES Damanik, Romanus
Journal Information System Development (ISD) Vol 3, No 2 (2018): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTInfectious diseases known as infectious diseases are a disease caused by a biological agent (such as viruses, bacteria or parasites), which can be transmitted or transmitted to others through certain media such as air, food and drink that are less clean , syringes and blood transfusions and direct contact with the patient. The expert system is one of the branches of Artificial Intelligence that makes extensive use of knowledge, especially for the expert-level problem-solving. Bayes is a simple probabilistic based prediction technique based on bayes rules. The goal to be achieved is to create a useful expert system application as a tool to get information on infectious diseases in infants.
SISTEM ENKRIPSI DAN DEKRIPSI SERTA PENYEMBUNYIAN FILE TEKS MENGGUNAKAN ALGORITMA RC4 DAN END OF FILE (EOF) PADA CITRA DIGITAL Damanik, Romanus
Journal Information System Development (ISD) Vol 3, No 1 (2018): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Basically, confidential data needs to be stored or delivered in a certain way so as not to be known by unauthorized foreign parties. And to overcome the problem then created the science of cryptography and steganography. One example of a cryptographic algorithm is the Rivest Code 4 (RC4) algorithm, and one example of the steganographic algorithm is End Of File (EOF). Cryptographic algorithms can be combined with steganographic algorithms so that the secret messages we have are more secure than foreign interference. First of all secret messages that we have first encrypted using the Rivest Code 4 (RC4) algorithm, then the encrypted ciphertext is hidden / inserted in the image / image media with the End Of File (EOF) steganography method.Keyword: Kriptografi, steganografi, rivest code 4, end of file, cipherteks
Metode Pengacakan Algoritma Fisher Yates Pada Game Edukasi Pengenalan Kosakata Bahasa Inggris Damanik, Romanus
Journal Information System Development (ISD) Vol 4, No 1 (2019): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (496.873 KB)

Abstract

English is a universal language that is important and has a big role in the world of gaming. Therefore, in order to make children learn English in activities they like. An educational game was made, educational games were built aiming to improve children's ability in terms of English. This game is also designed based on Android so that it makes it easier for players to access games without the need for an internet network to play. In programming, this game implements Fisher Yates algorithm to do the randomization process in the game. The Fisher Yates algorithm is an algorithm for generating a random permutation from a finite set, in other words to randomize a set. This game is played by a player, to complete each level of the game, with the higher level of the game will also increase the level of difficulty. Using a database with SQLite to store player names, questions and levels that have been achieved.
Perbandingan Algoritma k-Nearest Neighbors (k-NN) dan Support Vector Machines (SVM) untuk Klasifikasi Pengenalan Citra Wajah Silitonga, Parasian DP; Damanik, Romanus
Jurnal ICT : Information Communication & Technology Vol 20, No 1 (2021): JICT-IKMI, Juli 2021
Publisher : STMIK IKMI Cirebon

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36054/jict-ikmi.v20i1.354

Abstract

Abstract- The study of face recognition is one of the areas of computer vision that requires significant research at the moment. Numerous researchers have conducted studies on facial image recognition using a variety of techniques or methods to achieve the highest level of accuracy possible when recognizing a person's face from existing images. However, recognizing the image of a human face is not easy for a computer. As a result, several approaches were taken to resolve this issue. This study compares two (two) machine learning algorithms for facial image recognition to determine which algorithm has the highest level of accuracy, precision, recall, and AUC. The comparison is carried out in the following steps: image acquisition, preprocessing, feature extraction, face classification, training, and testing. Based on the stages and experiments conducted on public image datasets, it is concluded that the SVM algorithm, on average, has a higher level of accuracy, precision, and recall than the k-NN algorithm when the dataset proportion is 90:10. While the k-NN algorithm has the highest similarity in terms of accuracy, precision, and recall at 80%: 20% and 70%: 30% of 99.20. However, for the highest AUC percentage level, the k-NN algorithm outperforms SVM at a dataset proportion of 80%: 20% at 100%.
Pengkodean Pesan Teks Dengan Proses Penerapan Algoritma Kriptografi Secure Hash Algorithm (SHA)) Romanus Damanik
Jurnal Informatika Kaputama (JIK) Vol 1 No. 1 Tahun 2017
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/jik.v1i1.17

Abstract

Masalah Keamanan merupakan salah satu aspek penting dari sistem informasi. Begitu pentingnyanilai informasi menyebabkan seringkali informasi diinginkan oleh orang tertentu kemudian dapatmemodifikasi informasi tersebut. Untuk dapat mengesahkan informasi yang didapatkan, maka harusdilakukan authentication pada informasi sehingga diketahui keaslian informasi. Dalam penelitian inidiimplementasikan suatu metode secure hash algorithm, sehingga penerima informasi dapat mengetahuiadanya perubahan terhadap data penting yang diterima dari pihak lain. Metode ini mampu membangkitkannilai hash dari sebuah string atau file. Dengan perubahan sekecil apapun pada informasi yangditerima, dapat diketahui keasliannya. Secure Hash Algorithm adalah fungsi hash yang bekerja satu arah,ini berarti pesan yang sudah diubah menjadi message digest tidak dapat dikembalikan menjadi pesan semula.Dua pesan yang berbeda akan selalu menghasilkan nilai hash yang berbeda pula. Hasil rancangan perangkatlunak ini dengan input panjang string yang berbeda akan menghasilkan output dengan panjang string tetapyaitu 160 bit.
PENENTUAN MINAT BACA SISWA DALAM PEMINJAMAN BUKU DENGAN METODE SMART (SIMPLE MULTI ATTRIBUT RATING TECHNIQUE) Romanus Damanik
Jurnal Informatika Kaputama (JIK) Vol 5, No 2 (2021): Volume 5, Nomor 2 Juli 2021
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/jik.v5i2.551

Abstract

Humans to be able to communicate with themselves and others are required to have the ability to read. Reading interest will grow if it is supported by adequate reading materials and is of interest to the reader, because it is from reading material that a person will encounter various things that have never been known before. The SMART method is a method for multi-attribute decision making. This multi-criteria decision-making technique is based on the theory that each alternative consists of a number of criteria that have values and each criterion has a weight that describes how important it is compared to other criteria. This weighting is used to assess each alternative in order to obtain the best alternative. For that the writer tries to make a Decision Support System to Determine the Reading Interest of students in Borrowing Books. In making this Decision Support System the author uses MS. Visual Basic 2010 for data processing. Thus, a manual work process using the SMART method can be distinguished. From the calculation results of the 20 data that have been carried out, the ranking results with the highest score are Fahira Rambe (A7) with a value of 0.83, which means that they have the highest reading interest among other students.
IMPLEMENTASI TIK PADA BADAN USAHA MILIK DESA (BUMDES) DENGAN MODEL MULTIMEDIA DEVELOPMENT LIFE CYCLE (MDLC) UNTUK INFORMASI DIGITAL PARIWISATA SEBAGAI PENINGKATAN KUALITAS LAYANAN PENGUNJUNG DESA WISATA DOKAN Romanus Damanik; Wasit Ginting
Jurnal Informatika Kaputama (JIK) Vol 5, No 1 (2021): Volume 5, Nomor 1 Januari 2021
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/jik.v5i1.388

Abstract

Multimedia Development Life Cycle (MDLC) yang terdiri dari 6 tahap setelah dahulu didapatkan data keterangan dari setiap objek yang ada di Desa Dokan tersebut terlebih informasi Rumah Adat Karo siwaluhjabu apa fungsi dan kegunaan tiap ruangan yang ada di rumah adat tersebut dan juga sejarah dari rumah adat tersebut, temasuk dokumen desa tentang pertanyaan apa saja yang sering muncul dari para pengunjung. Multimedia Development Life Cycle (MDLC), adalah teknologi dengan konsep menggabungkan dimensi dunia nyata dengan dimensi dunia maya yang di tampilkan secara realtime. MDLC tidak seperti realitas maya yang yang sepenuhnya menggantikan apa yang ada di dunia nyata, namun hanya sekedar menambahkan atau melengkapi. Hal ini dilakukan dengan cara 'menggambar' objek tiga dimensi pada marker, yakni sebuah 'pola' yang bersifat unik dan dapat dikenali oleh aplikasinya. Smartphone memungkinkan pengembangan aplikasi Augmented Reality dengan murah serta dapat diakses oleh banyak pengguna. MDLC dapat dimanfaatkan dalam berbagai bidang salah satunya adalah sebagai sarana untuk pengembangan kebudayaan yang ada disetiap provinsi. MDLC dapat digunakan untuk menciptakan sebuah lingkungan pengenalan yang lebih interaktif dimana pengguna dapat berinteraksi langsung dengan obyek dunia maya sehingga pengguna pun dapat sambil belajar. Penulis mengembangkan sebuah aplikasi yang ditujukan kepada para seluruh pengguna aplikasi. Aplikasi ini akan berjalan pada platform mobile android untuk memudahkan pengguna untuk mengaksesnya. Selain itu, pengguna dapat memilih sendiri objek yang akan dijadikan marker nya untuk membuat penggunaan aplikasi menjadi jauh lebih mudah.
Application of Simulation of Dining Philosophers Problem in Concurrent Process Parasian DP Silitonga; Irene Sri Morina; Romanus Damanik
SMARTICS Journal Vol 7 No 1: SMARTICS Journal (April 2021)
Publisher : Universitas PGRI Kanjuruhan Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21067/smartics.v7i1.5229

Abstract

A classic simulation that can describe concurrent processes on an operating system is the dining philosopher problem. In the dining philosophers problem, there is the possibility of a deadlock, a condition in which two or more processes cannot continue their execution. This research produces a software application that can simulate the concurrent process and prevent deadlock problems that occur. The benefit of the simulation in this study is as a visualization of the completion of dining philosophers problems and as an additional facility in the teaching and learning process, especially in operating system courses