Claim Missing Document
Check
Articles

IMPLEMENTASI METODE MARR-HILDERTH OPERATOR UNTUK MENDETEKSI TEPI CITRA IKONOS Zalukhu, Yusman; Sunandar, Hery; Hondro, Rivalri Kristianto
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 2, No 1 (2018): Peranan Teknologi dan Informasi Terhadap Peningkatan Sumber Daya Manusia di Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v2i1.957

Abstract

Ikonos imagery is a satellite image that has high spatial resolution with an accuracy of one meter pixels for panchromatic and four meters to multispektral. Ikonos imagery is often used to map the process, view, measure and memoniotring areas of work/activities on the Earth. Ikonos image of Government also often use it for things like national security evaluation against the occurrence of the disaster, city planning, mineral exploration and mine planning monitoring of agriculture, and others. Image digital imaging results over long distances using satellite is often there are disturbances in the form of light distortion, noise or other distractions that cause the object on the image less obvious or obscure. This discussion on the research being done is knowing the process of detection on image by calculating the difference between two dots are bertetanggan, and is in the process of smoothing and thresholding on image ikonos. The methods used in this research is a method of Marr-Hilderth. In addition, a process that is done on this research is conducting a testing method against Marr-Hilderth, which can be implemented to fix the blurry objects on images ikonos. The results of this research is to generate image ikonos with display clear object with the menerapakan method of the Marr-Hilderth and tested using the matlab application version 7.8 (r2009a).Keywords: Ikonos image, image processing, method of Marr-Hilderth, Matlab 7.8
PENERAPAN METODE SIMPLEKS UNTUK MENGANALISA PERSAMAAN LINIER DALAM MENGHITUNG KEUNTUNGAN MAKSIMUM Nasution, Zuhria; Sunandar, Hery; Lubis, Ikwan; Sianturi, Lince Tomoria
JURIKOM (Jurnal Riset Komputer) Vol 3, No 4 (2016): Agustus 2016
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (562.942 KB) | DOI: 10.30865/jurikom.v3i4.338

Abstract

Persamaan linier merupakan sebuah persamaan aljabar dimana tiap sukunya mengandung konstanta atau perkalian konstanta dengan tanda sama dengan serta variabelnya. Untuk memecahkan sistem persamaan linier denngan mengganti sistem yang diberikan dengan sistem baru yang mempunyai himpunan pemecahan yang sama dengan pemecahan yang lebih mudah. Untuk menghitung keuntungan pada Usaha Cubby masih menggunakan kalkulator dan penulisan pada buku. Dengan sistem yang berjalan saat ini, dalam perhitungan keuntungan maksimum seharusnya terselesaikan dengan cepat dan tepat sehingga memiliki perhitungan yang akurat. Berdasarkan masalah yang ada diatas, maka perlu sebuah perancangan sistem yang dapat memberikan kemudahan dalam hal mengitung keuntungan. Adapun untuk mencapai tujuan tersebut, penulis menggunakan metode Simpleks dalam proses penghitungan keuntungan maksimum. Alat bantu analisis dan perancangan meliputi Use Case Diagram, Activity Diagram. Perangkat lunak pendukung yang digunakan adalah Micosoft Visual Basic. Net 2008 dan Microsoft Access 2007. Perhitungan keuntungan maksimum diharapkan dapat mempermudah dan mempercepat proses perhitungan. Kata Kunci: Persamaan Linier, Simpleks dan Visual Basic.Net 2008
EXPERT SYSTEM FOR TROUBLESHOOTING LAPTOP MOTHERBOARD DAMAGE USING FORWARD CHAINING METHOD AT BUDI DARMA UNIVERSITY COMPUTER LAB Hery Sunandar; Berto Nadeak; Pristiwanto; Saidi Ramadan Siregar
INFOKUM Vol. 9 No. 1,Desember (2020): Data Mining, Image Processing,artificial intelligence, networking
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (336.378 KB)

Abstract

The development of laptop hardware technology in the 21st century is increasingly rapid to support information technology that is increasingly easily accessed. Laptops have an important role in helping human activities, especially in teaching and learning activities. Not infrequently a laptop or better known as a laptop as most students and lecturers and even students who sit in secondary education have started to use it. In national tertiary education, the entire campus requires both public and private universities to have laptop laboratories. Along with these developments in the case of laptop usage is getting bigger.
Determination Of Budi Darma University Ordering Patterns Needs With Apriory Algorithm Hery Sunandar; Abdul Sani Sembiring
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (914.954 KB)

Abstract

In a university, office stationery is needed to support the teaching and learning process, one of which is paper, markers, ink and so on. In determining the right strategy in terms of purchasing stationery, an effective analysis is needed, to reduce excessive spending. One way that can be done to order stationery is to use data mining techniques. The data mining technique used in this case is to use the Apriori algorithm. The a priori algorithm is one of the classical data mining algorithms. The a priori algorithm is used so that computers can learn association rules, look for patterns of relationships between one or more items in a dataset. This research was conducted by observing several research variables that are often considered by universities in ordering office stationery. (ATK). The results of this study are in the form of interesting patterns of data mining results which are important information to support ordering stationery
Sistem Pendukung Keputusan Penentuan Instruktur Bahasa Inggris Dengan Metode Simple Additive Weighting (SAW) Hery Sunandar; Denni M Rajagukguk
JUKI : Jurnal Komputer dan Informatika Vol. 1 No. 2 (2019): JUKI : Jurnal Komputer dan Informatika, Edisi November 2019
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53842/juki.v1i2.18

Abstract

Use of Decision Support Systems (SPK) can help someone in making decisions that are accurate and right on target. Many problems can be solved by using SPK. This study aims to design SPK with SAW Method for the determination of English instructors. This system utilizes criteria and weights. There are 6 main criteria for gauges. Based on the SPK analysis using the SAW method the results of performance effectiveness are obtained. Based on the SAW method the effectiveness of the determination of the English instructor is influenced by many factors that are the criteria of the decision support system.
Sistem Pakar Mendiagnosa Penyakit Kaki Gajah Menggunakan Metode Certainty Factor Nelly Astuti Hasibuan; Hery Sunandar; Senanti Alas; Suginam Suginam
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 2 (2017): Edisi Juli
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v2i1.16

Abstract

Elephant foot disease or filariasis is a contagious disease caused by filarial worms that are transmitted through the type of mosquito. This disease is chronic and if not get treatment will result in permanent disability in the form of leg enlargement, genitals both women and men. Elephant foot disease is generally detected through blood microcopy examination. Until now it is still felt because microfilaria only appear in the blood at night for several hours (nocturnal perioicity). In addition, various methods of examination are also performed to diagnose elephantiasis diseases such as those known as membrane crawl, knott concentration method and deposition technique. This study identifies elephantiasis and its causes, and applies certainty factor methods and designs expert systems to diagnose elephantiasis. To diagnose elephantiasis by using certainty factor method. Patients will be given questions to obtain probable values and then the values obtained will be solved by certainty factor formulation, so that the diagnosis and percentage is likely to develop elephantiasis.
Workshop Pengenalan Openmediavault Sebagai Sistem Operasi Jaringan Pada Sekolah Menengah Kejuruan (SMK) Mandiri Saidi Ramadan Siregar; Hery Sunandar; Pristiwanto Pristiwanto
Journal of Social Responsibility Projects by Higher Education Forum Vol 2 No 1 (2021): Juli 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1324.75 KB)

Abstract

The development of technology in the field of computer networks in the era of the 21st century is very fast along with its rival, namely information system technology. Both of these technologies play an important role in the world of informatics because they complement each other and contribute to each other. For example, the information system already exists but the storage is still constrained, which means that the information system only runs on standalone, meaning it runs on its own device. as an operating system network attached storage is one of the data storage in a computer network where everything related to data can be stored in it including information systems that can be run through the operating system. At the level of Vocational High School (SMK) the Department of Computer Network Technology still rarely practices in making data storage using a network-based operating system. Therefore, it is necessary to make efforts to upper secondary level students, especially vocational schools majoring in computer network technology in knowing or increasing their knowledge of data storage in computer networks by utilizing open source services. Workshop is the last solution to provide direct practice to these students because in essence they are very happy with hands-on practice. In order for this workshop to run as expected and coincide with the COVID-19 pandemic, the implementing team or community service participants obey the health protocol. The practicum software media used are virtualbox, openmediavault, while the hardware is in the form of a laptop that has been provided by the Budi Darma University which has been given prior permission by the campus. The final result of this activity is that the students are able to install app templates from portainer.io
PERBANDINGAN METODE MD4 DAN SHA 384 UNTUK MENDETEKSI ORISINALITAS CITRA DIGITAL Lemcia Hutajulu; Hery Sunandar; Imam Saputra
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1598

Abstract

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384
PERBANDINGAN METODE MD2 DAN MD4 UNTUK MENDETEKSI KEASLIAN CITRA DIGITAL Gokma Lumbantoruan; Hery Sunandar; Imam Saputra
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1617

Abstract

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others.The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD2 and MD4 methods to detect the originality of digital images, by using this method an image that is still doubtful of its authenticity can be found out that the image is authentic or fake. Keywords: Authenticity, Image, MD2 and MD4
IMPLEMENTASI METODE MARR-HILDERTH OPERATOR UNTUK MENDETEKSI TEPI CITRA IKONOS Yusman Zalukhu; Hery Sunandar; Rivalri Kristianto Hondro
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 2, No 1 (2018): Peranan Teknologi dan Informasi Terhadap Peningkatan Sumber Daya Manusia di Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v2i1.957

Abstract

Ikonos imagery is a satellite image that has high spatial resolution with an accuracy of one meter pixels for panchromatic and four meters to multispektral. Ikonos imagery is often used to map the process, view, measure and memoniotring areas of work/activities on the Earth. Ikonos image of Government also often use it for things like national security evaluation against the occurrence of the disaster, city planning, mineral exploration and mine planning monitoring of agriculture, and others. Image digital imaging results over long distances using satellite is often there are disturbances in the form of light distortion, noise or other distractions that cause the object on the image less obvious or obscure. This discussion on the research being done is knowing the process of detection on image by calculating the difference between two dots are bertetanggan, and is in the process of smoothing and thresholding on image ikonos. The methods used in this research is a method of Marr-Hilderth. In addition, a process that is done on this research is conducting a testing method against Marr-Hilderth, which can be implemented to fix the blurry objects on images ikonos. The results of this research is to generate image ikonos with display clear object with the menerapakan method of the Marr-Hilderth and tested using the matlab application version 7.8 (r2009a).Keywords: Ikonos image, image processing, method of Marr-Hilderth, Matlab 7.8