Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : INFOKUM

Determination Of Budi Darma University Ordering Patterns Needs With Apriory Algorithm Hery Sunandar; Abdul Sani Sembiring
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (914.954 KB)

Abstract

In a university, office stationery is needed to support the teaching and learning process, one of which is paper, markers, ink and so on. In determining the right strategy in terms of purchasing stationery, an effective analysis is needed, to reduce excessive spending. One way that can be done to order stationery is to use data mining techniques. The data mining technique used in this case is to use the Apriori algorithm. The a priori algorithm is one of the classical data mining algorithms. The a priori algorithm is used so that computers can learn association rules, look for patterns of relationships between one or more items in a dataset. This research was conducted by observing several research variables that are often considered by universities in ordering office stationery. (ATK). The results of this study are in the form of interesting patterns of data mining results which are important information to support ordering stationery
APPLICATION OF THE COX METHOD TO DIGITAL IMAGES FOR COPYRIGHT PROTECTION Abdul Sani Sembiring; Pandi Barita Nauli Simangunsong
INFOKUM Vol. 10 No. 5 (2022): December, Computer and Communication
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

All these digital products can be downloaded easily. And can be exchanged with services such as e-mail. One way to protect multimedia copyrights is to embed information into the multimedia data (watermarking) as a digital signature of the legal owner of the multimedia product. Thus, the embedded watermark does not damage the protected digital data. So that the person who opens the multimedia product knows about the ownership of the maker. Digital data that will be applied in this research is only data in the form of digital images. Currently there are several watermarking methods that can be applied to digital images, such as: Least Significant Bit Coding, Patchwork (introduced by Bender), Pitas and Kaskalis, Caroni, Cox, Randomly Sequenced Pulse Position Modulated Code (RSPPMC), and others. However, the authors are interested in methods that utilize the characteristics of the Discrete Cosine Transform (DCT).