Claim Missing Document
Check
Articles

Found 34 Documents
Search

IMPLEMENTASI ALGORITMA APRIORI PADA ANALISA POLA DATA PENYAKIT MANUSIA YANG DISEBABKAN OLEH ROKOK Waruwu, Fince Tinus; Buulolo, Efori; Ndruru, Eferoni
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v1i1.492

Abstract

Berdasarkan berbagai kasus yang terjadi bahwa penyakit yang disebabkan oleh merokok lebih dari satu jenis penyakit atau komplikasi. Untuk mengetahui pola penyakit yang disebabkan rokok sangat perlu menganalisa pola penyakit dengan menganalisa data-data pasien pada Rumah Sakit. Rokok produk yang berbahaya & adiktif (menimbulkan ketergantungan). Di dalam rokok terdapat 4000 bahan kimia berbahaya yang 69 diantaranya merupakan zat karsinogenik (dapat menimbulkan kanker). Zat-zat berbahaya yang terkandung didalam rokok antara lain seperti tar, karbon monoksida, sianida, arsen, formalin, nitrosamine dan lainnya. algoritma apriori bisa melakukan penelusuran pada data historis untuk mengidentifikasi pola data yang didasarkan pada sifat-sifat yang teridentifikasi sebelumnya. Penelitian lainnya mengatakan algoritma Apriori salah satu bentuk terapan data mining yang menghasilkan model pengetahuan berupa aturan dengan nilai confidence. Model pengetahuan tersebut dapat digunakan untuk memprediksi kecenderungan data yang akan datang.
ALOKASI PEKERJA PADA SUATU PROYEK DENGAN METODE HUNGARIAN (STUDI KASUS: PT. IRA WIDYA UTAMA MEDAN) Ndruru, Eferoni; Waruwu, Fince Tinus; Yanny, Anda
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v1i1.500

Abstract

The allocation of workers is very much needed by the company. But in reality the company is difficult to place employees in every allocation. But with the development of existing technology, it can be minimized by calculating the cost of each worker and each allocation by utilizing existing data and extraction to generate new knowledge. Implementation of operational research techniques using hungarian methods and tested using a system or application as a decision tree to assign some decent workers to be placed on existing jobs within the company. The extension process can show the group of employee data that fall into the category of workers and the allocation so as to optimize the costs that are out by the company. So PT.Ira Widya Utama Medan can be a reference to take decisions in assigning and allocating employees next.
Penerapan Aplikasi Ujian Akhir Semester Menggunakan Metode Computerized Classification Dengan Addaptive Feedback Tampubolon, Tigor Barata; Buulolo, Efori; Ndruru, Eferoni
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 4, No 1 (2020): The Liberty of Thinking and Innovation
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v4i1.2678

Abstract

The world of education is experiencing a very rapid development which is supported by innovations that were born from the development of information technology, including the application of online examinations. The examination system during midterm and end-of-semester exams is still conventional, which means that exams are carried out using paper (Paper-Based Test) which is wasteful of paper and time. The online examination system (Computerized Classification Test) is part of an educational information system that has implemented information technology by offering efficiency and effectiveness. In this study, the authors created an online exam system. This online exam system development method uses addaptive feedback, namely direct assessment without waiting a long time to find out the value, the online exam system provides benefits, namely there is no need to procure exam papers and save time for exam corrections so that efficiency and effectiveness are the goals of making the test system. online can be achieved.Keywords: Online Examination, System, Application, CCT, Addaptive Feedback
PENERAPAN ALGORITMA NEAREST NEIGHBOR DALAM MEMPREDIKSI KELAYAKAN PENERIMAAN KARTU KREDIT PADA BANK CIMB NIAGA Ndruru, Eferoni; Zebua, Taronisokhi
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 5 No. 1 (2019): Maret 2019
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v5i1.410

Abstract

A credit card application is a financial facility that allows a person or business entity to borrow money to buy a product and pay it back within a specified time. Credit card manufacture often experiences risk in providing credit, both moderate, good and very good risk, due to lack of data analysis and lack of attention. So the purpose of this study is to analyze the risks that often occur in making credit cards. And provide efficient solutions. In solving this problem, it is necessary to apply the method. The method used in this study is Nearest Neighbor. The Nearest Neighbor algorithm is an approach to finding cases by calculating the proximity between new cases (testing data) and old cases (training data), which is based on matching the weights of a number of existing features. Therefore, it can be applied in analyzing old customer data with data new so that comparisons can be made whether or not it is eligible to receive credit. The results obtained in this study are the results of testing systems and methods by producing a level of risk.
Perancangan Aplikasi Keamanan Data Dengan Kombinasi Algoritma Kriptografi RC4 Dan One Time Pad Anas, Irfan; Ginting, Guidio Leonarde; Ndruru, Eferoni; Sembiring, Abdul Sani; Zebua, Taronisokhi
JURIKOM (Jurnal Riset Komputer) Vol 8, No 1 (2021): Februari 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v7i5.2541

Abstract

Data is an important aspect that has important information in it, which includes numbers, characters, symbols, pictures, sounds, or other signs that can be used as information. Data are certain facts, thus producing information. Cryptography is often used to secure and encode text data, messages, or other information, so using cryptographic algorithms on text data is able to secure data that is very important to everyone. So the expected results from the RC4 Cryptography algorithm and One Time Pad, which are used in text data can help in securing or encoding very important text data, so that the text is not easy to read or know the original message.
Application of Text Message Held in Image Using Combination of Least Significant Bit Method and One Time Pad Eferoni Ndruru; Taronisokhi Zebua
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 13, No 4 (2019): October
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.46401

Abstract

Stenography and security are one of the techniques to develop art in securing data. Stenography has the most important aspect is the level of security in data hiding, which makes the third party unable to detect some information that has been secured. Usually used to hide textinformationThe (LSB) algorithm is one of the basic algorithms proposed by Arawak and Giant in 1994 to determine the frequent item set for Boolean association rules. A priory algorithm includes the type of association rules in data mining. The rule that states associations between attributes are often called affinity analysis or market basket analysis. OTP can be widely used in business. With the knowledge of text message, concealment techniques will make it easier for companies to know the number of frequencies of sales data, making it easier for companies to take an appropriate transaction action. The results of this study, hide the text message on the image (image) by using a combination of LSB and Otp methods.
PENERAPAN METODE ARAS DALAM PEMILIHAN LOKASI OBJEK WISATA YANG TERBAIK PADA KABUPATEN NIAS SELATAN Eferoni Ndruru; Eviyanti Novita Purba
METHOMIKA: Jurnal Manajemen Informatika & Komputerisasi Akuntansi Vol. 3 No. 2 (2019): METHOMIKA: Jurnal Manajemen Informatika & Komputersisasi Akuntansi
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (385.723 KB) | DOI: 10.46880/jmika.Vol3No2.pp151-159

Abstract

Keindahan suatu objek wisata merupakan salah satu tujuan utama para wisatawan dalam menghabiskan liburan mereka dan selain keindahan masih banyak lagi yang membuat para wisatawa tertarik. Objek wisatawa yang semakin banyak dan keindahan yang berbeda-beda, serta perlengkapan yang lengkap, sehingga para wisatawan merasa sulit untuk menentkan objek wisata yang terbaik berdarkan kelengkapan fasilitas dan keindahan wisata yang akan mereka kunjungin. Selama ini banyak pendatang baru atau para wisatawan yang merasa kesal dalam mengujungi berbagai objek wisata khususnya dikabupaten nias selatan yang disebabkan belum mengetahui keindahan objek wisata tersebut. Dari permasalahan tersebut diperlukan sistem pendukung keputusan yang dapat membantu para wisatawan dalam menentukan objek wisata yang terbaik sehingga mereka tidak sia-sia dalam mengujinginya. Dalam penyelesaian sistem pendukung keputusan tersebut diperlukan metode dalam menguji data kuantitatif. Metode yang digunakan adalah metode Additive Ratio Assessment (ARAS) merupakan metode pengambilan keputusan dalam perangkingan kriteria yang menggunakan prinsip bahwa alternatif yang terpilih harus mempunyai jarak terdekat dengan solusi ideal positif dan jarak terjauh dengan solusi ideal negatif dengan melakukan pembobotan setiap kriteria. Hasil yang akan didapat dalam penelitian ini adalah hasil perangkingan jenis objek wisata yang paling tertinggi yang di dapat dalam perhitungan metode Aras. Sehingga dari nilai perangkingan dapat memberikan informasi objek mana saja yang akan mendekati objek wisata yang terbaik. Dan bahasa pemrograman yang digunakan adalah bahasa pemrograma microsoft visual basic net 2008.
Message Security on Chat App based on Massey Omura Algorithm Taronisokhi Zebua; Rivalri Kristianto Hondro; Eferoni Ndruru
IJISTECH (International Journal of Information System and Technology) Vol 1, No 2 (2018): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v1i2.11

Abstract

Security of message on chat apps is very important to do so that messages that distributed always safety for others who do not have access permission. However, not all chat apps currently have tools that used to secure messages. This is still often overlooked, thus providing an easy space for the attackers to hack messages that are distributed. This research explains the usage of the massey-omura algorithm to secure text type message in chat apps when message distributed
Message Security on Chat App based on Massey Omura Algorithm Taronisokhi Zebua; Rivalri Kristianto Hondro; Eferoni Ndruru
IJISTECH (International Journal of Information System and Technology) Vol 1, No 2 (2018): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (189.109 KB) | DOI: 10.30645/ijistech.v1i2.11

Abstract

Security of message on chat apps is very important to do so that messages that distributed always safety for others who do not have access permission. However, not all chat apps currently have tools that used to secure messages. This is still often overlooked, thus providing an easy space for the attackers to hack messages that are distributed. This research explains the usage of the massey-omura algorithm to secure text type message in chat apps when message distributed
Analisa Metode Mash-1 Untuk Mendeteksi Orisinalitas Citra Digital Hotmian Gultom; Lince Tomoria Sianturi; Eferoni Ndruru
Bulletin of Computer Science Research Vol. 1 No. 2 (2021): April 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of digital images is now very fast. Image data processing in digital images makes images easy to create or manipulate easily, without even leaving visual clues to the user. The ease of creating and changing an image can damage the credibility of the original image in various aspects. Small changes of pixels do not make image content detectable to the human eye. This is described in pixel like width and length in the image. the basis of this research to detect the authenticity of a digital image. This study will analyze the authenticity of the image and manipulation. This research is expected to produce and show good results in the form of evidence in detecting objects in the image so that it can help the public in determining the authenticity and manipulation of images.