Claim Missing Document
Check
Articles

Found 15 Documents
Search

IMPLEMENTASI APLIKASI AMAL KORBAN KECELAKAAN BERBASIS ANDROID MENGGUNAKAN METODE FUNDRAISING Yennimar Yennimar; Gerson Tandiono; Lena LH Hasibuan; Standley Malvin Japardy; Landong Hutasoit
Journal Of Informatic Pelita Nusantara Vol 4 No 1 (2019): Computer Science
Publisher : STMIK Pelita NUsantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (410.905 KB)

Abstract

Fundraising or teyan is the process of collecting voluntary contributions in the form of money or other resources by asking for donations from individuals, companies, foundations, or government institutions. The purpose of fundraising varies, among others, to obtain operating funds from non-profit organizations (such as Wikimedia), to finance political campaigns, and even to finance companies. Making this application is done by the Waterfall method. Android based application with eclipse program, javacscript programming language, and MySQL database as data storage media. So that this application is expected to help the foundation in managing donations for accident victims.
IMPLEMENTASI KESESUAIAN OBAT PADA PENYAKIT MENGGUNAKAN ALGORITMA APRIORI Yennimar Yennimar; Evan Chandra Sibarani; Irwansyah Irwansyah; Muhammad Iqbal Tri Rahmadi; Reza Syahputra
Jurnal Mantik Penusa Vol. 3 No. 1.1 (19): Manajemen dan Ilmu Komputer
Publisher : Lembaga Penelitian dan Pengabdian (LPPM) STMIK Pelita Nusantara Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Health is important for every living thing, especially humans. there are several things that are important in maintaining health, including eating high-energy foods and foods that have vitamins. However, sometimes the disease can not be guessed. Disease can attack our bodies, especially diabetes.Diabetes is a disease that lasts a long time or chronic, and is characterized by high blood sugar (glucose) levels or above normal values. If diabetes is not well controlled, it can cause various complications that can endanger the lives of patients. Because this disease is dangerous, so not just drugs can cure this disease. Appropriate drugs are needed to treat this disease, drugs that are suitable for this disease can be seen based on which drugs are often purchased by patients. Therefore we need a data collection algorithm / basket that has high accuracy. Apriori is one of the data collection algorithms using a basket that has a high accuracy that reaches 80%. The data we use in this study reached 1000 drug data but only 27 types of diabetes drugs that we use. and consists of 365 contractions.The purpose of this study is to recommend which drugs are most suitable for patients by finding which drugs are often purchased at Royal Prima Indonesia Hospital. The application that researchers use in this study is the WEKA application.
APLIKASI BACTERIAL COLONY OPTIMIZATION UNTUK OPTIMALISASI PRODUKSI Yennimar Yennimar; Sunarly Wijaya; Antonius Nyomadi
Jurnal Mantik Penusa Vol. 3 No. 1.1 (19): Manajemen dan Ilmu Komputer
Publisher : Lembaga Penelitian dan Pengabdian (LPPM) STMIK Pelita Nusantara Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (645.915 KB)

Abstract

In implementing the production of goods, companies often have difficulty in managing the production process so as to maximize the use of existing resources. To do this, it is necessary to optimize production. The simplest method that can be used to optimize production is the Simplex method. However, this Simplex method can only be used to optimize production with one optimization equation. To solve a linear programming model with several optimization equations, several other methods can be used, such as Bacterial Colony Optimization (BCO). This Bacterial Colony Optimization (BCO) algorithm implements the artificial behavior of bacteria. The basic behavior of bacteria in the life cycle can be separated into four parts, namely chemotaxis, reproduction, migration and communication. Based on the tests carried out, obtained information that the BCO method can minimize the required production costs, but the production time required is longer.
ANALISIS PERFORMA ALGORITMA BLOWFISH DAN TEA DALAM PENGAMANAN DATA: ANALISIS PERFORMA ALGORITMA BLOWFISH DAN TEA DALAM PENGAMANAN DATA Yennimar Yennimar; Annisa Fadhlila; Pratiwi Pratiwi; Anita Yose Fanny Manurung; Risda Amelia Amanta Br Ginting
Jurnal Mantik Vol. 3 No. 2 (2019): Augustus: Manajemen, Teknologi Informatiak dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (639.562 KB)

Abstract

Keamanan maupun kerahasiaan data menjadi hal penting untuk diperhatikan dikarenakan keamanan data berhubungan dengan pencegahan dari pencurian data oleh pihak yang tidak bertanggung jawab. Teknik yang dapat digunakan untuk mengamankan data yaitu dengan kriptografi. Beberapa metode kriptografi memiliki performa yang baik dan buruk tergantung dengan tipe kuncinya. Maka dari itu, tujuan dari penelitian ini adalah mengukur tingkat kecepatan dari algoritm Blowfish dan algoritma TEA, dengan tipe data text dan gambar. Hasil dari penelitian ini Algoritma Blowfish dalam proses enkripsi dan dekripsi data lebih aman dan lebih unggul dari algoritma TEA. Rata-rata kecepatan enkripsi algoritma Blowfish untuk file gambar 650ms dan deskripsi 637ms sedangkan TEA waktu kecepatan enkripsi 685ms dan deskripsi 699ms. Pada file docx algoritma Blowfish memiliki kecepatan proses enkripsi 31ms dan deskripsi 94ms dan Algoritma TEA waktu kecepatan enkripsi 157ms dan deskripsi 141ms.
Comparison Of Jenkins Box Method And Multiple Linier Regression In Predicting The Noble Metal Price: Comparison Of Jenkins Box Method And Multiple Linier Regression In Predicting The Noble Metal Price Bayu Gunara; Yennimar Yennimar
Jurnal Mantik Vol. 3 No. 4 (2020): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Nowadays, gold investment practitioners generally use instinct and guess in investing in gold. This is certainly a problem because it has a high error margin. To solve these problems, the forecasting process can be carried out.To be able to forecast gold prices with low error rates, various studies have been conducted. The Box-Jenkins method performs better than other methods in predicting the price of gold, because the Box-Jenkins method applies forecasting by relying on the historical statistics of gold prices beforehand. The Box-Jenkins method is an iterative of choosing the best model for the stationary series of a group of linear time series models called the ARIMA (Autoregressive Integrated Moving Average) model. However, the ARIMA method is a complex method and is not easy to use and requires a long execution time to obtain forecasting results with a high degree of accuracy. To improve the accuracy of prediction results from ARIMA, the ARIMA method can be combined with the multiple regression method into a hybrid method. The Multiple Linear Regression Method is a mathematical technique that minimizes the difference between the actual value and the predicted value.The results of this study are an application of forecasting the price of gold using the ARIMA method and Multiple Linear Regression. The application also provides a facility to test the results of the methods used. Based on the results of testing the accuracy of the prediction results from the hybrid method with 30 data = 48%, 60 data = 40%, and 118 data = 40.81%.
Implementation Of Extreme Learning Machine Method With GVF Snake For Character Recognition: Implementation Of Extreme Learning Machine Method With GVF Snake For Character Recognition Pradana Yusna; Yennimar Yennimar
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In everyday life, sometimes it is necessary to change the contents of the printouts of certain documents, but the digital files from the printed documents have been lost. Retype the document manually will certainly spend a lot of time making it inefficient. To solve this problem, the printed document can be scanned into a digital image file and a character recognition system is implemented to recognize the characters contained therein. In this study, the Gradient Vector Flow Snake (GVF Snake) method is used to determine the boundaries of an object based on the computed vector gradient in the form of binary or gray-level values ??obtained from an image with several frameworks. After that, the Extreme Learning Machine (ELM) method will be used to predict the characters that have been broken up by the GVF Snake method. The results of this study are software that applies the GVF Snake and ELM methods to perform the character recognition process of an image printed by a document.
Comparison of Spread Spectrum with Redundant Pattern Coding In Securing Text Messages Into Audio: Comparison of Spread Spectrum with Redundant Pattern Coding In Securing Text Messages Into Audio Ray Sanjaya Gulo; Reni Lusiana Simangunsong; Stephen Boy Kristian Tafonao; Muhammad Yusuf; Yennimar Yennimar
Jurnal Mantik Vol. 4 No. 2 (2020): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.928.pp1237-1242

Abstract

The transmission of information from one place to another is mostly constrained by the security problems of the information itself. Moreover, this information is very confidential, so not just anyone can open it. One of the ways that can be done to hide confidential information is by using cryptographic techniques, namely by encoding the information using certain algorithms. The second way is to insert the information into certain media, such as digital images or audio, so that the information will be hidden and what will appear is the media only, while the information is disguised. In this study, the comparison of the Spread Spectrum steganography algorithm with the Redundant Pattern Coding algorithm to secure text messages in audio files. The data used are audio files with a size between 200 Kb to 265 Kb and text with a size of 50 bytes to 275 bytes. The experimental results obtained stego audio files from the insertion of the Spread Spectrum algorithm with an average PSNR value of 41,138 db and for the Redundant Pattern Coding algorithm the average PSNR value was 29,885 db.
Customer Churn’s Analysis In Telecomunications Company Using Fp-Growth Algorithm: Customer Churn’s Analysis In Telecomunications Company Using Fp-Growth Algorithm Kelvin Kelvin; Cindy Cindy; Charles Charles; Denny Peter Leonardo; Yennimar Yennimar
Jurnal Mantik Vol. 4 No. 2 (2020): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.933.pp1285-1290

Abstract

Nowadays the competition between companies is increasing. Companies need to predict their customers to find out the level of customer loyalty. One way is to analyze customer data by doing Customer Churn Prediction. In this study the method used is the FP-Growth Algorithm. The FP-Growth algorithm is an algorithm that uses the association rules technique to determine the data that appears most frequently. The data used in this study are secondary data and have 7,403 data from customers. The data has 21 variables. By using a minimum support of 1.2% and confidence at 80%, the associative rules generated are 60. The variable of the type of internet the customer has is strong enough to predict churn. It can be seen that of the 60 associative rules, there are 36 associative rules that have this variable. Testing associative rules on test data yields an accuracy of 71%.
Comparative Analysis of Five Modulus an Pictorial Block Algorithms For Data Hiding in Digital Images Syandi Nainggolan; Yennimar Yennimar
Jurnal Mantik Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.976.pp1663-1670

Abstract

Steganography is an art and science that studies invisible communication from confidential data on a multimedia carrier such as image, audio and video files. The most popular steganography method is the LSB (Least Significant Bit) method. However, the LSB method is very vulnerable to attack by using basic image processing operations. In 2013, Jassim applied the Five Modulus method in the steganography process. Five Modulus method will solve a digital image into a set of image sub-blocks called windows with size n x n. A secret message will be inserted in that window. According to Jassim, the smaller the window size, the more secret messages that can be inserted into the image. Meanwhile, in the Pictorial Block steganography algorithm, the secret information will be stored in a grayscale digital image file and converted to ASCII values ??and the length of the information will be calculated. After that, the digital image will be divided into 2n x 2n blocks using the block truncation coding (BTC) algorithm. Then, the block will be converted to binary format and incorporate the original information on its decomposition matrix. The pictorial block steganography algorithm uses the BTC algorithm to convert the grayscale input image block into a binary image block so that the secret information bit insertion operation can be performed. The resulting steganography software can hide confidential data into a digital image. The secret data stored in the stego image can be extracted out in the extraction process.
Implementation of Clustering Methods to Know Electricity Energy Sold Average Customer Type Reinhard Oktaveri Gultom; Estomih Wau; Jodi Alexsander Laia; Ivan Leonardo Silaban; Yennimar Yennimar
Jurnal Mantik Vol. 5 No. 2 (2021): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/jurnalmantik.Vol5.2021.1475.pp1119-1126

Abstract

The need for electrical energy in Indonesia continues to increase from time to time. In realizing the need for electrical energy, it is important to order electrical energy based on the type of customer. In collecting this electrical energy, grouping is needed. The results of the gathering can be utilized by PT. PLN to anticipate disruptions in the supply of electrical energy. This investigation plans to determine the electrical energy sold by type of customer (KWH) in 2016 to 2019 in Indonesia and dissect the power requirements in 2019. The strategy used is group development using rapidminner. The variables that cause the utilization of the tourism industry in Indonesia are Population, Economic and Industrial Developments. To meet the need for the use of electrical energy which continues to increase from year to year, the matters and groupings of the use of electrical energy for the use of electrical energy were completed in 2014 to 2019. The information and targets used in the meeting were gross domestic electricity, group information and power information. (per customer type and power utilization). from 2011 to 2015. The side effect of ordering electrical energy in Indonesia using the fuzzy bunching strategy was 272,630 KWH in 2019, an increase of 85,089 KWH with an annual normal increase of 6.96%. the result group of the strategy has a normal of 18,730 KWH against RUPTL.