Claim Missing Document
Check
Articles

Found 25 Documents
Search

Penerapan Metode Dempster Shafer Dalam Mendeteksi Kerusakan Mesin Air Berbasis Android Afrilia, Yolanda; Sembiring, Abdul Sani; Hutabarat, Hukendik
JURIKOM (Jurnal Riset Komputer) Vol 5, No 2 (2018): April 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (400.294 KB) | DOI: 10.30865/jurikom.v5i2.666

Abstract

Many people do not understand the water damage, so tend to use the technician regardless of the damage. What's more to the present day many people do things quickly and accurately? Treatments that would be done alone without having to come to the service is very helpful at all for everyday life. The expert system is one of the artificial intelligence systems that contain the knowledge and experience that one expert puts into one particular area each person can use to solve a specific problem. In this case, water span range occurs in daily life. In this thesis will be discussed on how to find damage to the water machine by applying the Dempster-Shafer method. This method is used to search for evidence based on belief functions and plausible reasoning used by combining separate information (evidence) pottery to calculate the possibility of a malfunction.
Perancangan Aplikasi Keamanan Data Dengan Kombinasi Algoritma Kriptografi RC4 Dan One Time Pad Anas, Irfan; Ginting, Guidio Leonarde; Ndruru, Eferoni; Sembiring, Abdul Sani; Zebua, Taronisokhi
JURIKOM (Jurnal Riset Komputer) Vol 8, No 1 (2021): Februari 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v7i5.2541

Abstract

Data is an important aspect that has important information in it, which includes numbers, characters, symbols, pictures, sounds, or other signs that can be used as information. Data are certain facts, thus producing information. Cryptography is often used to secure and encode text data, messages, or other information, so using cryptographic algorithms on text data is able to secure data that is very important to everyone. So the expected results from the RC4 Cryptography algorithm and One Time Pad, which are used in text data can help in securing or encoding very important text data, so that the text is not easy to read or know the original message.
Determination Of Budi Darma University Ordering Patterns Needs With Apriory Algorithm Hery Sunandar; Abdul Sani Sembiring
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (914.954 KB)

Abstract

In a university, office stationery is needed to support the teaching and learning process, one of which is paper, markers, ink and so on. In determining the right strategy in terms of purchasing stationery, an effective analysis is needed, to reduce excessive spending. One way that can be done to order stationery is to use data mining techniques. The data mining technique used in this case is to use the Apriori algorithm. The a priori algorithm is one of the classical data mining algorithms. The a priori algorithm is used so that computers can learn association rules, look for patterns of relationships between one or more items in a dataset. This research was conducted by observing several research variables that are often considered by universities in ordering office stationery. (ATK). The results of this study are in the form of interesting patterns of data mining results which are important information to support ordering stationery
Penerapan Metode Preference Rangking Organization Methof for Encrichment Evaluation (PROMETHEE II) Dalam Penyeleksian Penyiar Radio Emi Safitri; Abdul Sani Sembiring; Suginam Suginam
Jurnal Sistem Komputer dan Informatika (JSON) Vol 3, No 1 (2021): September 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v3i1.2629

Abstract

One of the media that presents information quickly and is supported by high technology, one of which is radio. Radio as the oldest and most familiar communication media tool in the world continues to survive amidst many new media such as the internet. Radio up to now is still believed to be an information and communication media tool favored by many people because it has an important role in disseminating information about information about education, entertainment or other advertisements and events. To convey this information needed Human Resources (HR) is needed, namely broadcasters. In selecting the radio broadcaster must meet the requirements or criteria, so that they are chosen to be broadcasters. One solution to these problems is right by using a Decision Support System (SPK). Decision Support System (SPK) can help radio stations in making decisions on the selection of good radio broadcasters and increasing the efficiency of the decision. The promethee II method is one of the Multi Criteria Decision Making (MCDM) methods which means that it determines or sequences in a multicriteria analysis, this method is known because the concept is efficient and simple, in addition to solving problems related to multicriteria, others.
Penerapan Algoritma CAST-128 pada Proses Enkripsi dan Dekripsi Teks Yessi Sriani Barus; Abdul Sani Sembiring
JUKI : Jurnal Komputer dan Informatika Vol. 2 No. 1 (2020): JUKI : Jurnal Komputer dan Informatika, Edisi Mei 2020
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53842/juki.v2i1.25

Abstract

Encoding was first made using a classic algorithm. This algorithm builds its security on the confidentiality of the algorithm used. However, this algorithm is inefficient when used to communicate with many people because the algorithm is still very simple and still very easy to solve, so important information or data that you want to keep secret can be easily discovered by other people or people who are not responsible. CAST-128 is a cryptographic algorithm that is said to be similar to the DES algorithm which uses 16 rounds of feistel network as one of its strengths. Where in the process of encryption and decryption of text CAST-128 uses a 64-bit block length and key lengths of up to 128 bits. For information, the CAST-128 algorithm is referred to as one of the strong cryptographic algorithms against various types of cryptanalysis, including differential and linear attacks. With the application of the CAST-128 algorithm in the process of encrypting and decrypting text, it will be more difficult to decode text encoded by people who do not know the key so as to create more security than the encoded text. So when the text wants to be sent or transferred to the flashdisk will be more confidential.
Pemanfaatan Aplikasi Catatan Keuangan Harian Dalam Pengelolaan Keuangan Keluarga Abdul Sani Sembiring
Jurnal ABDIMAS Budi Darma Vol 2, No 1 (2021): Agustus 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (255.632 KB) | DOI: 10.30865/pengabdian.v2i1.3251

Abstract

Sebagai unit terkecil dari Masyarakat yaitu keluarga kurang memikirkan rekapitulasi dari pemasukan dan pengeluaran di dalam keluarga. Penerapan aplikasi dalam mengelola keuangan keluarga dianggap masih sangat rumit dan kurang bermanfaat dibandingkan dengan catatan keuangan keluarga bersifat manual. Tidak memahami cara mengelola keuangan menjadi salah satu sumber masalah yang paling besar pada keluarga. Dimana secara umum pendapatan dan pengeluaran di dalam keluarga yang jumlahnya besar saja yang diingat tetapi tidak tercatat. Mengelola keuangan keluarga merupakan hal penting agar pendapatan dan pengeluaran dapat seimbang sesuai dengan yang diinginkan. Dengan adanya aplikasi catatan keuangan harian, di dalam sebuah keluarga diharapkan dapat membantu dalam mengelola keuangan sehingga dapat tercatat secara detailKata Kunci: Manfaat, Aplikasi, Catatan Keuangan Keluarga, Keuangan, Keluarga
Pemanfaatan Aplikasi Meeting Daring Zoom Pada Anak Sekolah Di Perumahan Griya Duren Tuntungan Abdul Sani Sembiring
Jurnal ABDIMAS Budi Darma Vol 2, No 2 (2022): Februari 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (567.789 KB) | DOI: 10.30865/pengabdian.v2i2.3850

Abstract

One of the effects of Covid-19 that has attacked Indonesia, especially in the field of education, is that it requires learning to be carried out using distance learning media. One of these distance learning media is the Zoom online meeting application. Many school children do not understand how to use the features provided in the Zoom application. The provision of information on the use of the features that exist in the zoom is still considered very lacking for school children in general, considering that these school children cannot directly receive training on the use and utilization of the application. Zoom meet is a face-to-face conference platform where educators and students can interact directly like meeting in person in class. In this application there are many features provided and offer the easiest facilities for individuals who want to join.
TEKNIK PENYEMBUNYIAN PESAN TEKS TERENKRIPSI ALGORITMA MERKLE-HELLMAN KNAPSACK MENGGUNAKAN METODE PIXEL VALUE DIFFERENCING KE DALAM CITRA DIGITAL Agung Lestari; Abdul Sani Sembiring; Taronisokhi Zebua
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1590

Abstract

Optimization of data security techniques is very necessary so that the data or information that is secured is really safe from attack. Data that has been encrypted based on cryptographic techniques very quickly raises suspicion that the data is confidential or important. Therefore, this technique is better combined with steganography techniques. Utilization of steganography techniques can minimize the attacker's suspicion of data that is secured, because by using steganography data techniques can be hidden on certain objects. This study discusses how to encode a text based on the Merkle-Hellman Knapsack algorithm and the resulting password is hidden in a grayscale digital image as a hiding object based on the pixel value differencing algorithm. This is done to minimize suspicion and make it difficult for attackers to find out confidential or important data.Keywords: cryptography,steganography, merkle-hellmankanpsack, PVD, image
PENINGKATAN KEAMANAN DATA TEKS TERENKRIPSI ALGORITMA LUCIFER MENGGUNAKAN STEGANOGRAFI GIFSHUFFLE PADA CITRA Dian Anggara; Abdul Sani Sembiring
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1626

Abstract

Increased resistance to the algorithm used to secure secret messages is very necessary. This is caused by the ability of the attackers who are able to justify various ways to solve the algorithm used to secure data. Lucifer algorithm has many variants, one of which is a lucifer with a 16-round feistel network that operates on 128 bit blocks and uses 128-bit keys. Computing 2 ^ 36 plaintext and 2 ^ 36 complexity can attack this variant. This study describes the use of the gifshuffle algorithm to optimize the Lucifer algorithm in securing data. The gifshuffle algorithm is used to hide encrypted messages based on the Lucifer algorithm into the gif format media. Based on tests conducted, it was found that there were no significant differences in the cover image and stegano image after the message insertion process was carried out.Keywords: Cryptography, Steganography, Lucifer, Gifshuffle, message
Implementasi Algoritma Adaptive Arithmetic Coding Pada Aplikasi Juz’ Amma Berbasis Android Ari Maulana Asri; Abdul Sani Sembiring
JURIKOM (Jurnal Riset Komputer) Vol 8, No 2 (2021): April 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v8i2.2828

Abstract

The size of the text file is relatively large, where the more information contained in the file, the larger the size of the text file needed to store the information, so that it has an impact on the file size that must be stored on the storage media. The memory size required to store a file is directly proportional to the size of the text file. The problem that occurs is the limited storage space available, especially for Android applications. If the text file size is larger than the storage space or the maximum size limit for a file, sending the text file will fail or the information contained in the text file will not be conveyed properly. This research studies text file compression techniques using arithmetic coding, and implements it for compression and decompression cases. Things to be studied include: looking at the effect of character variations in a text on the compression ratio, the resulting compression time and the decompression time. The experimental results show that the highest compression ratio is obtained when a text has only one type of character. The effect of character variations on the compression ratio is that the more character variations a text has, the lower the compression ratio.