Articles
            
            
            
            
            
                            
                    
                        Penyembunyian Data Untuk Seluruh Ekstensi File Menggunakan Kriptografi Vernam Cipher dan Bit Shiffting 
                    
                    Christy Atika Sari; 
Eko Hari Rachmawanto; 
Danang Wahyu Utomo; 
Ramadhan Rakhmat Sani                    
                     Journal of Applied Intelligent System Vol 1, No 3 (2016): Oktober 2016 
                    
                    Publisher : Universitas Dian Nuswantoro and IndoCEISS 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.33633/jais.v1i3.1252                            
                                            
                    
                        
                            
                            
                                
Kriptografi sebagai salah satu cabang ilmu yang dapat digunakan untuk mengamankan data hingga saat ini terus dikembangkan melalui berbagai algoritma. Beberapa penelitian terkait mengenai kriptografi masih mengguankan media berupa teks saja, image saja, maupun file tertentu saja. Pada penelitian ini akan digunakan media berupa seluruh jenis file sebagai media inputan. Adapun algoritma yang dignuakan yaitu Vernam cipher dan Bit shiffting. Kedua algoritma ini dikenal cepat, mudah dan aman untuk digunakan. Percobaan yang dilakukan menggunakan 30 file berbeda ukuran maupun jenis file serta telah diuji melalui aplikasi yang dibangun dengan Visual Basic telah menghasilkan proses enkripsi dan dekripsi data yang berjalan dengan baik. File hasil enkripsi dapat dibuka dengan kunci yang telah ditetapkan dan tidak mengalami kerusakan, dan sebaliknya untuk proses dekripsi data juga demikian. Hasil percobaan menggunakan sampling file berukuran 1 kb hingga 24000 kb, dimana waktu terlama untuk mengenkripsi file yaitu 28,661 detik dan untuk proses dekripsi terlama membutuhkan waktu 27,222 detik. Kata kunci—Vernam cipher, Bit shiffting, Kriptografi, File
                            
                         
                     
                 
                
                            
                    
                        An Enhancement of One Time Pad Based on Monoalphabeth Caesar Cipher to Secure Grayscale Image 
                    
                    Christy Atika Sari; 
Lalang Erawan; 
Eko Hari Rachmawanto; 
De Rosal Ignatius Moses Setiadi; 
Tan Samuel Permana                    
                     Journal of Applied Intelligent System Vol 2, No 2 (2017): December 2017 
                    
                    Publisher : Universitas Dian Nuswantoro and IndoCEISS 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.33633/jais.v2i2.1616                            
                                            
                    
                        
                            
                            
                                
Image is an object that has been used by various people since long ago. Utilization of these images evolve in line with advances in technology. Image in this information technology era is not only in a physical form, there is also a form of so-called digital image. Many people use digital images for personal use, so prone to be manipulated by others. Cryptographic technique, such as Caesar Cipher and OTP is a security techniques that can be applied to the digital image to avoid manipulation or theft of data image. The result is, an image can be read only by the sender and the recipient's image alone. Combined the two algorithms have fast turnaround time, up to 0.017791 seconds for the image to the size of 512x341 and 0.032302 seconds for the image to the size of 768x512. In addition, the resulting image has a very low degree of similarity,  with the highest PSNR value obtained is 6.8653 dB. It can be concluded that the combined algorithm and OTP Caesar Cipher algorithm is fast and difficult to solve.
                            
                         
                     
                 
                
                            
                    
                        Secure Image Steganography Algorithm Based on DCT with OTP Encryption 
                    
                    De Rosal Ignatius Moses Setiadi; 
Eko Hari Rachmawanto; 
Christy Atika Sari                    
                     Journal of Applied Intelligent System Vol 2, No 1 (2017): April 2017 
                    
                    Publisher : Universitas Dian Nuswantoro and IndoCEISS 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.33633/jais.v2i1.1330                            
                                            
                    
                        
                            
                            
                                
Rapid development of Internet makes transactions message even easier and faster. The main problem in the transactions message is security, especially if the message is private and secret. To secure these messages is usually done with steganography or cryptography. Steganography is a way to hide messages into other digital content such as images, video or audio so it does not seem nondescript from the outside. While cryptography is a technique to encrypt messages so that messages can not be read directly. In this paper have proposed combination of steganography using discrete cosine transform (DCT) and cryptography using the one-time pad or vernam cipher implemented on a digital image. The measurement method used to determine the quality of stego image is the peak signal to noise ratio (PSNR) and ormalize cross Correlation (NCC) to measure the quality of the extraction of the decrypted message. Of steganography and encryption methods proposed obtained satisfactory results with PSNR and NCC high and resistant to JPEG compression and median filter. Keywords—Image Steganography, Discrete Cosine Transform (DCT), One Time Pad, Vernam, Chiper, Image Cryptography
                            
                         
                     
                 
                
                            
                    
                        A High Result for Image Security Using Crypto-Stegano Based on ECB Mode and LSB Encryption 
                    
                    Kas Raygaputra Ilaga; 
Christy Atika Sari; 
Eko Hari Rachmawanto                    
                     Journal of Applied Intelligent System Vol 3, No 1 (2018): Journal of Applied Intelligent System 
                    
                    Publisher : Universitas Dian Nuswantoro and IndoCEISS 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.33633/jais.v3i1.1694                            
                                            
                    
                        
                            
                            
                                
The development of the digital world in the field of information technology is so rapid that making the exchange of information easy and fast. Such information may be general or specific. In general information there is no problem for the public, but specific information can not be free in the public. The main problem of the specific information is security, how the information is safe. To overcome these problems can be solved using cryptography and steganography. Cryptography is a technique for securing secret information from uninvolved parties, which the outcome is much different from the original information. Steganography is a technique to secure or hide the secret information on a digital object such as sound, image, vidio that applied results as seen the original information. In this paper proposed a combination of ECB Mode cryptographic method and LSB steganographic method on a digital image. The measurement method are PSNR and MSE to determine the quality of the stego image. Our results are excellent for digital image encryption of RGB and Grayscale type since the resulting image looks like the original image, with the best stego-image proof with MSE is 0.00013, PSNR is 87.00141, SSIM is 1 shown as excellent result.
                            
                         
                     
                 
                
                            
                    
                        Visitor Prediction Decision Support System at Dieng Tourism Objects Using the K-Nearest Neighbor Method 
                    
                    Eko Hari Rachmawanto; 
Christy Atika Sari; 
Heru Pramono; 
Wellia Shinta Sari                    
                     Journal of Applied Intelligent System Vol 7, No 2 (2022): Journal of Applied Intelligent System 
                    
                    Publisher : Universitas Dian Nuswantoro and IndoCEISS 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.33633/jais.v7i2.6821                            
                                            
                    
                        
                            
                            
                                
A tourist target is anything that attracts a visitor or tourist to come to visit a place or area. Tourism goods play an important role in a country or region, becoming a source of national foreign exchange, increasing human resources, and improving the economy of surrounding communities. The problem posed in this study is how to implement a decision support system in predicting visitor numbers for Dieng tourists using the k-nearest neighbor method. The purpose of this study is to help the local government and surrounding communities to improve facilities such as restaurants, places of worship, parking lots, clean toilets so that tourists can feel safe and comfortable when visiting Dieng. Helps manage tourism targets. is what you give. These attractions using a decision support system as a process to predict visitors. The number of visitors who visited in December 2017 was 421,394, which serves as a reference for predicting the number of visitors who will visit Dieng in the following year. The predicted result is 29569.25 visitors with a parameter value of k = 8 and a minimum RMSE value of k = 1/0.
                            
                         
                     
                 
                
                            
                    
                        Sentiment Analyst on Twitter Using the K-Nearest Neighbors (KNN) Algorithm Against Covid-19 Vaccination 
                    
                    Suprayogi Suprayogi; 
Christy Atika Sari; 
Eko Hari Rachmawanto                    
                     Journal of Applied Intelligent System Vol 7, No 2 (2022): Journal of Applied Intelligent System 
                    
                    Publisher : Universitas Dian Nuswantoro and IndoCEISS 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.33633/jais.v7i2.6734                            
                                            
                    
                        
                            
                            
                                
The corona virus (2019-nCoV), commonly known as COVID-19 has been officially designated as a global pandemic by the WHO. Twitter, is one of the social media used by many people and is popular among internet users in expressing opinions. One of the problems related to Covid-19 and causing a stir is the procurement of the Covid-19 vaccine. The procurement of the vaccine caused various opinions in Indonesian society, where the uproar was also quite busy being discussed on Twitter and even became a Trending Topic. The opinions that appear on Twitter will then be used as data for the Sentiment Analysis process. One of the members of the House of Representatives (DPR), namely RibkaTjiptaning was also included in the Trending Topic list on Twitter for refusing to receive the Covid-19 vaccine. Sentiment analysis itself is a computational study of opinions, sentiments and emotions expressed textually. Sentiment analysis is also a technique to extract information in the form of a person's attitude towards an issue or event by classifying the polarity of a text. Research related to Sentiment Analysis will be examined by dividing public opinion on Twitter social media into positive and negative sentiments, and using the K-Nearest Neighbor (KNN) algorithm to classify public opinion about COVID-19 vaccination. In the testing section, the Confusion Matrix method is used which then results in an accuracy of 85%, precision of 100%, and recall of 78.94%.
                            
                         
                     
                 
                
                            
                    
                        The Implementation of Improved Advanced Encryption Standard and Least Significant Bit for Securing Messages in Images 
                    
                    Pujiono, Imam Prayogo; 
Rachmawanto, Eko Hari; 
Nugroho, Dicky Anggriawan                    
                     Journal of Applied Intelligent System Vol. 8 No. 1 (2023): Journal of Applied Intelligent System 
                    
                    Publisher : Universitas Dian Nuswantoro and IndoCEISS 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.33633/jais.v8i1.7324                            
                                            
                    
                        
                            
                            
                                
Security and confidentiality are essential aspects needed in the process of exchanging messages. Maintaining the message's security and confidentiality can be done by encrypting the message with cryptographic techniques to protect the message. However, the encrypted message (ciphertext) usually raises suspicion from eavesdroppers so that they try to unravel the contents of the message or damage the contents of the message or prevent the message from reaching the intended recipient. To avoid eavesdroppers' suspicion of encrypted messages, after encryption, the ciphertext can then be inserted into an image using steganography techniques so that eavesdroppers do not know whether there is a secret message in an image. In this research, the authors use the Improved AES-128 (Advanced Encryption Standard) Algorithm to encrypt messages and LSB (Least Significant Bit) Algorithm to insert ciphertext into an image. Where the AES Algorithm Improvement is made by adding a sending and receiving applications ID to modify the Key Schedule process, with modifications to the Key Schedule process, messages can only be read on the original recipient's cellphone by entering the correct key. The results of this study show that eavesdroppers do not easily know the existence of the ciphertext, besides that even if the eavesdroppers get the ciphertext and know the encryption key, the message remains unreadable on their cellphone because the ID of the application sending or receiving the message has changed.
                            
                         
                     
                 
                
                            
                    
                        Crypto-Stegano Color Image Based on Rivest Cipher 4 (RC4) and Least Significant Bit (LSB) 
                    
                    Rachmawanto, Eko Hari; 
Hasbi, Hanif Maulana; 
Sari, Christy Atika; 
Irawan, Candra; 
Inzaghi, Reza Bayu Ahmad; 
Akbar, Ilham Januar                    
                     Journal of Applied Intelligent System Vol. 8 No. 2 (2023): Journal of Applied Intelligent System 
                    
                    Publisher : Universitas Dian Nuswantoro and IndoCEISS 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.33633/jais.v8i2.8497                            
                                            
                    
                        
                            
                            
                                
Rivest Cipher 4 (RC4) has the main factors that make this algorithm widely used, namely its speed and simplicity, so it is known to be easy for efficient implementation. The nature of the key in the RC4 algorithm is symmetrical and performs a plain per digit or byte per byte encryption process with binary operations (usually XOR) with a semirandom number. To improve the visual image after the encryption process, in this article we use the Least Significant Bit (LSB). In this study, the quality of the stego image and the original image has been calculated using MSE, PSNR and Entropy. Experiments were carried out by images with a size of 128x128 pixels to 2048x2048 pixels. Experiments using imperceptibility prove that the stego image quality is very good. This is evidenced by the image quality which has an average PSNR value above 53 dB, while the lowest PSNR value is 48 dB with a minimum dimension of 128x128 pixels.
                            
                         
                     
                 
                
                            
                    
                        Counselor Application Frontend with Personality- matching Using Android-Based K-Means Clustering Algorithm 
                    
                    Putra, Ifan Perdana; 
Rachmawanto, Eko Hari; 
Sari, Wellia Shinta; 
Rahayuningtyas, Tri Esti; 
Umam, Choerul; 
Himawan, Mahadika Pradipta; 
Yaacob, Noorayisahbe Bt Mohd                    
                     (JAIS) Journal of Applied Intelligent System Vol. 9 No. 1 (2024): Journal of Applied Intelligent System 
                    
                    Publisher : LPPM Universitas Dian Nuswantoro 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.62411/jais.v9i1.10217                            
                                            
                    
                        
                            
                            
                                
Education is one of the most important things for people to have. Many people are competing for education to increase their abilities. Technology plays a big role in developing access to education to make it easier with many online applications and online classes education becomes easier. However, there are still many unresolved problems in this field of education, namely the emergence of the phenomenon of incompatibility between educators and students so that student interest decreases dramatically because of this. And also, the lack of learning materials taught that are not school subjects such as programming. Therefore, the author and team designed an application where this application can find students a learning mentor outside of school so that they can increase their knowledge. The application also provides a matching feature based on the student's personality so that the student can find a suitable tutor.
                            
                         
                     
                 
                
                            
                    
                        Customer Segmentation Using K-Means Clustering with RFM Method (Case Study : PT. Dewangga Travindo Semarang) 
                    
                    Winaryanti, Hida Sekar; 
Hadi, Heru Pramono; 
Rachmawanto, Eko Hari                    
                     (JAIS) Journal of Applied Intelligent System Vol. 9 No. 1 (2024): Journal of Applied Intelligent System 
                    
                    Publisher : LPPM Universitas Dian Nuswantoro 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.62411/jais.v9i1.10440                            
                                            
                    
                        
                            
                            
                                
PT. Dewangga Travindo is a company that operates in the field of travel services which includes tours, travel, and Hajj and Umrah pilgrimages which is based in the city of Semarang and has received permission from the Ministry of Religion No. D/606 of 2013. Every year there is always an increase in sales of services. Hajj and Umrah. The higher transaction activity every day results in a large buildup of data in the database which will only become data waste. The ability to process data is increasingly sophisticated using data mining, which is an activity of looking for relationships between items to obtain patterns as information to assist in decision making. However, considering the large number of competitors offering the same services, it is necessary to increase competitiveness to overcome market segmentation at PT Dewangga Travindo. For this reason, this research was carried out which aims to overcome customer segmentation using the Clustering method with the K-Means algorithm which produces a visual cluster model with RStudio tools using RFM attributes applied to carry out segmentation. The data used in this research is data on Hajj and Umrah pilgrims in the 2018-2020 period.