Claim Missing Document
Check
Articles

Found 33 Documents
Search

Analisa Metode Mash-1 Untuk Mendeteksi Orisinalitas Citra Digital Hotmian Gultom; Lince Tomoria Sianturi; Eferoni Ndruru
Bulletin of Computer Science Research Vol. 1 No. 2 (2021): April 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of digital images is now very fast. Image data processing in digital images makes images easy to create or manipulate easily, without even leaving visual clues to the user. The ease of creating and changing an image can damage the credibility of the original image in various aspects. Small changes of pixels do not make image content detectable to the human eye. This is described in pixel like width and length in the image. the basis of this research to detect the authenticity of a digital image. This study will analyze the authenticity of the image and manipulation. This research is expected to produce and show good results in the form of evidence in detecting objects in the image so that it can help the public in determining the authenticity and manipulation of images.
Penerapan Metode Error Level Analysis dan Laplacian of Gausian Untuk Deteksi Tepi Citra CT Scan Paru-Paru Eferoni Ndruru; Murdani Murdani
Journal of Informatics Management and Information Technology Vol. 1 No. 1 (2021): January 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i1.95

Abstract

Edge detection of an image is one way to determine the authenticity of the data, at this time many scans are inefficient due to poor quality and unclear image colors. One of the problems that is often found is in the ct scan results to find out the truth of a disease. In this study, the problems that will be detected are the CT scan results of the lungs using the Error Level Analysis and Laplacian of Gausian method. The identification system can be seen from the results of a good file extraction. Extraction can be done by taking one part of the CT image. scan, and the part that is easiest to find is the edge of the image. The process of applying the Error Level Analysis and Laplacian of gausian method is by combining the Error Level Analysis method and the Lapciaan of gausian method. Method (ELA) a method is a modified image detection technique by restoring a new image, in the sense that it has been compressed after performing the calculation process on changing the compression level of the image. Meanwhile, the Laplacian of gausian method is a technique for detecting the edges of an image, so that the problem solving process is carried out by detecting the modified image and then proceeding to detect the edges of the image to determine the authenticity of the image. The results obtained from this study are the edge detection process of CT-Scan results obtained from the mean value of the Mean Square Error pixel
IMPLEMENTASI ALGORITMA APRIORI PADA ANALISA POLA DATA PENYAKIT MANUSIA YANG DISEBABKAN OLEH ROKOK Fince Tinus Waruwu; Efori Buulolo; Eferoni Ndruru
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v1i1.492

Abstract

Berdasarkan berbagai kasus yang terjadi bahwa penyakit yang disebabkan oleh merokok lebih dari satu jenis penyakit atau komplikasi. Untuk mengetahui pola penyakit yang disebabkan rokok sangat perlu menganalisa pola penyakit dengan menganalisa data-data pasien pada Rumah Sakit. Rokok produk yang berbahaya & adiktif (menimbulkan ketergantungan). Di dalam rokok terdapat 4000 bahan kimia berbahaya yang 69 diantaranya merupakan zat karsinogenik (dapat menimbulkan kanker). Zat-zat berbahaya yang terkandung didalam rokok antara lain seperti tar, karbon monoksida, sianida, arsen, formalin, nitrosamine dan lainnya. algoritma apriori bisa melakukan penelusuran pada data historis untuk mengidentifikasi pola data yang didasarkan pada sifat-sifat yang teridentifikasi sebelumnya. Penelitian lainnya mengatakan algoritma Apriori salah satu bentuk terapan data mining yang menghasilkan model pengetahuan berupa aturan dengan nilai confidence. Model pengetahuan tersebut dapat digunakan untuk memprediksi kecenderungan data yang akan datang.
IMPLEMENTASI ALGORITMA C5.0 PADA KELULUSAN PESERTA UJIAN KEMAHIRAN BERBAHASA INDONESIA (UKBI) PADA BALAI BAHASA SUMATERA UTARA Mauhati Pardede; Efori Buulolo; Eferoni Ndruru
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1569

Abstract

The development of the modern era has made many people more influenced in using foreign languages in their daily lives. Almost every day, the people especially the generation in this era understand more about the use of foreign languages than the language from their own country. One of the efforts to strengthen the position of Indonesian is carried out by the Balai Balai Bahasa by developing an Indonesian language proficiency test tool called the Indonesian Language Proficiency Test (UKBI). The Indonesian Language Proficiency Test (UKBI) was assessed based on several factors of the participant's ability to listen, respond to the rules, read, write and speak. So far some of the UKBI participants at the North Sumatra Language Center have failed or failed, one of the contributing factors is that the assessment was not fulfilled. To overcome the problems above, a method is needed. The technique that can be utilized in the process of processing data is the classification with the C5.0 algorithm. C5.0 algorithm is a classification algorithm applied to decision tree techniques that are processed using information gain. In selecting attributes for object breakers in several classes, the attribute that produces the greatest information gain with the highest information gain value will be chosen as the parent of the next node.Keywords: Indonesian Language Proficiency Test, C5.0 Algorithm
ALOKASI PEKERJA PADA SUATU PROYEK DENGAN METODE HUNGARIAN (STUDI KASUS: PT. IRA WIDYA UTAMA MEDAN) Eferoni Ndruru; Fince Tinus Waruwu; Anda Yanny
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v1i1.500

Abstract

The allocation of workers is very much needed by the company. But in reality the company is difficult to place employees in every allocation. But with the development of existing technology, it can be minimized by calculating the cost of each worker and each allocation by utilizing existing data and extraction to generate new knowledge. Implementation of operational research techniques using hungarian methods and tested using a system or application as a decision tree to assign some decent workers to be placed on existing jobs within the company. The extension process can show the group of employee data that fall into the category of workers and the allocation so as to optimize the costs that are out by the company. So PT.Ira Widya Utama Medan can be a reference to take decisions in assigning and allocating employees next.
How to Create and Randomize a Vegenere Cipher Key Based on the Key Procedure of RC4+ Algorithm Taronisokhi Zebua; Eferoni Ndruru
The IJICS (International Journal of Informatics and Computer Science) Vol 3, No 2 (2019): September 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (368.932 KB) | DOI: 10.30865/ijics.v3i2.1404

Abstract

The security of data not only depends on the complexity of the algorithm used, but one of the more important things to safeguard is key. The vegenere cipher algorithm is one of the common and easy to implement algorithms, but this algorithm is very easy to break with kasiki techniques by analyzing the word of cipher and keyword that have repetitive patterns. The RC4+ algorithm has the advantage of generating and generating fairly random keys. This research describes how to use the RC4+ key generation procedure to create and randomized the keys used in the vegenere cipher algorithm, to decrease recurrence of the same character of the cipher and character of the key
Implementasi Algoritma Hebb Rule Pada Diagnosa Penyakit Kolik Abdomen Pada Orang Dewasa Etty Diana Manurung; Berto Nadeak; Eferoni Ndruru
JURIKOM (Jurnal Riset Komputer) Vol 7, No 2 (2020): April 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v7i2.2086

Abstract

In the current era of globalization, the development of computers in the health sector has become increasingly rapid. Computerized systems are needed especially in handling a disease. Because sometimes doctors, nurses find it difficult to know the type of illness suffered by adults, children and the elderly without a good computerized system. Abdominal colic, for example. Abdominal colic is a disease where there is an unpleasant feeling in the oral cavity between the thigh border and the chest rib border. This disease is caused by several factors, for example, eating is already full, eating a lot of acid, spicy and also drinking lots of alcohol. And usually occurs in adults. Where symptoms are symptoms such as nausea, vomiting and noisy intestines and excessive farts. With these symptoms, which becomes a control that a person has abdominal colic disease. Therefore the author made a study of the implementation of the HB rule on the diagnosis of abdominal colic disease. Theebb rule algorithm is a simple and uncomplicated learning method in the process, with the aim of minimizing the risk of disease problems that occur in patients, especially adults
Pembangkitan Kunci Beaufort Cipher Dengan Teknik Blum-blum Shub pada Pengamanan Citra Digital Eferoni Ndruru; Taronisokhi Zebua
Bulletin of Information Technology (BIT) Vol 3 No 2: Juni 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bit.v3i2.302

Abstract

Data security is not only due to the complexity of the algorithms used, but one of the most important factors is the security of the keys used. One of the most popular data that needs to be backed up today is digital images. However, these days, the algorithms used to back up data are often attacked. This is because the structure of the key formations used is still weak. One of the data security algorithms that form a simple key is the Beaufort cipher. It relies on the duplication of key characters to form the key for each protected element. Key generators based on blum-blum shub technology can generate very random and difficult-to-guess keys, so the strength of the keys you use can enhance the resilience of protected data. Keys generated based on blum-blum shub technology will later be used in the process of encrypting and decrypting pixel values in digital images.
Penerapan Metode Multifactor Evaluation Process (MFED) Dengan Pembobotan Metode Rangking Dalam Penyeleksian Murid Masuk Kelas Tahfizd SMP Swasta Muhammadiyah-24 Aek Kanopan Dicky Marsella; Eferoni Ndruru; Fadlina Fadlina
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 6, No 1 (2022): Challenge and Opportunity For Z Generation in Metaverse Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v6i1.5789

Abstract

Aek Kanopan Muhammadiyah-24 Private Junior High School is known as MUHADAPAT with the Motto "Islamic, Intelligent, Superior, Achievement". This Tahfizd class is one of the classes with the highest number of registrants increasing every year, seen from previous years. In this case the selection of students entering the tahfizd class of Private Junior High School Muhammadiyah-24 Aek Kanopan However, there are obstacles in selecting students to enter the tahfizd class, because determining the selection results is still manually. So it is necessary to develop a system that can provide recommendations based on the ranking of student selection by applying the MFEP method. The method used in this study is the Multifactor Evaluation Process (MFEP). This method can guarantee to make it easier to determine the selection of students to enter the tahfizd class.
Algoritma Ant Colony Sistem dalam Penjadwalan Kegiatan Belajar Mengajar di SMP Prayatna Medan Murdani; Eferoni Ndruru
Jurnal Armada Informatika Vol 3 No 1 (2019): Jurnal Armada Informatika : Edisi Juni
Publisher : STMIK Methodist Binjai

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36520/jai.v3i1.24

Abstract

Algoritma ini memiliki kemampuan untuk menyelesaikan permasalahan optimisasi kombinatorial seperti traveling salesman problem (TSP), quadratic assignment problem, jobscheduling, vehicle routing, dan network routing. Untuk masalah penjadwalan, algoritma ini juga telah digunakan dalam menyelesaikan masalah penjadwalan kereta api, masalah penjadwalan ujian dan masalah penjadwalan kuliah di Sekolah . Sekolah Menengah Pertama ditempuh dalam waktu enam tahun, mulai dari kelas 1 sampai kelas 6. Penelitian terkait penjadwalan ini akan penulis lakukan di Sekolah Menengah Pertama Prayetna Medan. Saat ini penyusunan jadwal kegiatan belajar dilakukan secara manual. Hal ini tentu akan membutuhkan waktu dan pemikiran yang cukup besar dikarenakan batasan dan syarat tertentu yang harus dipenuhi saat menyusun jadwal. Misalnya, adanya kemungkinan seorang guru akan mengajar dua mata pelajaran yang berbeda sehingga perlu disusun agar jadwal guru tersebut tidak bentrok, menjadwalkan mata pelajaran yang tidak membebankan siswa dalam satu hari, dan beberapa batasan dan syarat lain yang telah ditetapkan dari sekolah. Pada umumnya penjadwalan kegiatan belajar mengajar di setiap sekolah dilakukan setiap memasuki semester ganjil dan dilakukan setahun sekali. Inti dari masalah ini adalah bagaimana menjadwalkan berbagai komponen yang terdiri dari guru, siswa, mata pelajaran, ruang dan waktu dengan memperhatikan sejumlah batasan dan syarat tertentu. Dibutuhkan sebuah penjadwalan yang baik agar komponen tersebut dapat didistribusikan secara merata dan tanpa ada bentrok satu dengan yang lainnya.