Claim Missing Document
Check
Articles

Found 18 Documents
Search

Identification of Nervosa Disease using Case-Based Reasoning Gunung, Tar Muhammad Raja; Suri, Riko Muhammad; Purnomo, Nopi; Idaman, Akbar; Muis, Abdul
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 1 (2024): Article Research Volume 6 Issue 1, January 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i1.3227

Abstract

Among teenagers or adults, body shape greatly affects a person's confidence. Most people will be very confident if their body shape is ideal, where the person will be very confident speaking in public. Different things with people who have a body shape that is too thin/fat, so their confidence is less to appear in public. To get the ideal body shape they will do everything possible, one of which is dieting, taking weight loss capsules, and so on. They do not know the dangers of dieting too strictly and taking weight loss capsules carelessly which can make them contract Nervosa disease. To get the results of the expert system, the case-based reasoning method will be used. After this application is built, the result obtained is the type of nervosa disease based on the symptoms felt by the user.
SISTEM PAKAR PEMILIHAN SMARTPHONE BERDASARKAN KEBUTUHAN DAN PREFERENSI USER MENGGUNAKAN METODE CASE BASED REASONING Gunung, Tar Muhammad Raja; Egani Sitepu, Sengli; Pandapotan Siregar, Manutur; Muis, Abdul; Rolanda, Vicky
Djtechno: Jurnal Teknologi Informasi Vol 6, No 2 (2025): Agustus
Publisher : Universitas Dharmawangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46576/djtechno.v6i2.7167

Abstract

Pemilihan smartphone yang sesuai dengan kebutuhan pengguna sering kali menjadi permasalahan tersendiri, terutama karena banyaknya pilihan produk dengan spesifikasi yang bervariasi. Penelitian ini bertujuan untuk menerapkan metode Case Based Reasoning (CBR) dalam proses rekomendasi smartphone berdasarkan preferensi pengguna. CBR bekerja dengan membandingkan kasus baru, yaitu kebutuhan dan kriteria pengguna, dengan kasus-kasus sebelumnya yang telah tersimpan dalam basis data untuk menentukan tingkat kemiripan. Pada penelitian ini, digunakan empat tahapan utama dalam metode CBR yaitu: Retrieve, Reuse, Revise, dan Retain.Hasil pengujian menunjukkan bahwa dari 13 alternatif smartphone yang dianalisis, Xiaomi Poco X5 Pro mendapatkan nilai kemiripan sebesar 100%, sedangkan perangkat lainnya seperti Realme Narzo 60x, Infinix Smart 8, Vivo V27, Samsung Galaxy A54, dan lainnya memperoleh nilai kemiripan 0%. Hal ini menunjukkan bahwa Xiaomi Poco X5 Pro merupakan pilihan paling sesuai dengan kebutuhan pengguna dalam studi kasus ini. Dengan demikian, metode CBR terbukti mampu memberikan rekomendasi yang tepat dan terukur, serta dapat menjadi dasar pengembangan sistem pakar atau sistem pendukung keputusan di masa mendatang.
Optimasi Implementasi Kriptografi Kunci Publik dalam Meningkatkan Keamanan dan Otentikasi Data pada Sistem Informasi Kampus Jinan, Abwabul; Siregar, Manutur Pandapotan; Suryani, Dede Fika; Muis, Abdul; Gunung, Tar Muhammad Raja
Digital Transformation Technology Vol. 5 No. 2 (2025): Periode September 2025
Publisher : Information Technology and Science(ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/digitech.v5i2.6425

Abstract

Perkembangan teknologi digital dan kebutuhan akan keamanan sistem informasi menjadi semakin penting, terutama di lingkungan universitas. Penelitian ini berfokus pada optimalisasi implementasi kriptografi kunci publik untuk meningkatkan keamanan data dan otentikasi dalam sistem informasi kampus. Algoritma yang digunakan antara lain RSA (Rivest-Shamir-Adleman) untuk enkripsi data dan DSA (Digital Signature Algorithm) untuk otentikasi digital. Hasil penelitian menunjukkan bahwa kombinasi RSA dan DSA efektif dalam melindungi kerahasiaan dan integritas data, serta memastikan bahwa informasi tetap otentik selama transmisi. Implementasi sistem diuji berdasarkan kecepatan enkripsi, akurasi otentikasi, dan efektivitas keamanan. Selain itu, analisis pengoptimalan dilakukan untuk menyeimbangkan kinerja dan tingkat keamanan dengan menyesuaikan ukuran kunci dan proses enkripsi selektif. Penelitian ini menyimpulkan bahwa penerapan kriptografi kunci publik di lingkungan universitas tidak hanya meningkatkan keamanan tetapi juga meningkatkan kepercayaan pengguna dalam menggunakan sistem informasi akademik.
Analisis Tingkat Penerapan Prinsip Interaksi Manusia dan Komputer pada Website Satya Terra Bhinneka Raja Gunung, Tar Muhammad; Lubis, Siti Sahara; Agustin, Riris; Selvanda, Alifia Restu; Odang, Diana Kemala
Jurnal Pustaka Data (Pusat Akses Kajian Database, Analisa Teknologi, dan Arsitektur Komputer) Vol 5 No 1 (2025): Jurnal Pustaka Data (Pusat Akses Kajian Database, Analisa Teknologi, dan Arsitekt
Publisher : Pustaka Galeri Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55382/jurnalpustakadata.v5i1.1007

Abstract

Website Kampus Satya Terra Bhinneka merupakan platform yang menyediakan akses informasi perkuliahan bagi mahasiswa Satya Terra Bhinneka. Analisis terhadap website ini bertujuan untuk mengkaji keterkaitan antara fungsi sistem dengan prinsip serta paradigma Interaksi Manusia dan Komputer (IMK). Dalam proses analisis desain antarmuka, penulis menerapkan metode evaluasi heuristik, dengan aspek yang dievaluasi meliputi aspek human, technology, usability, dan ergonomics. Hasil analisis menunjukkan bahwa Website Kampus Satya Terra Bhinneka telah memenuhi prinsip-prinsip Interaksi Manusia dan Komputer, di mana tujuan utama IMK adalah memudahkan pengguna dalam berinteraksi dengan sistem serta menyediakan umpan balik yang sesuai dengan kebutuhan pengguna.
Disguising Text Using Caesar Cipher, Reverse Cipher and Least Significant Bit (LSB) Algorithms in Video Siregar, Manutur; Jinan, Abwabul; Muhammad Raja Gunung, Tar
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 3 (2024): Articles Research Volume 6 Issue 3, July 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i3.4217

Abstract

In communication, there is a process of transferring information from the sender to the recipient. The information sent must be the same as the information received. If there are differences, it means that there has been a data change process carried out by irresponsible parties. One technique for changing the content of information is man in the middle. The data changer will receive information from the sender, then change it and forward it to the recipient, so that the changed information appears to have come from the sender.To protect information, this can be done by utilizing the science of cryptography and steganography which aims to protect information by changing it to another form or by inserting the information into other media. In this research, to protect information the Caesar Cipher Algorithm is used, this algorithm will change the letters in plaintext to another letter (ciphertext) by using an alphabetical shift according to the number in the form of the key used, namely > 1 and < 26, then the Reverse Cipher algorithm is carried out, namely changing the position of the letters of the plaintext from the first order to the last order and so on. The encrypted information will then be inserted into a video using the Steganography Algorithm, namely Least Significant Bit (LSB). Before being inserted, the video will first be converted into several image frames, then in one frame the information will be inserted. This can be done because the frame is a collection of RGB arrays which have values 0-255 or 0 and 1. So the insertion is done in bit form. Frames containing information will then be converted back into a video.On the receiving side, the video will be converted into a frame, next is the process of retrieving the information that was previously inserted. The information that has been taken is then reversed in order and then shifted using the Caesar chipper algorithm according to the key used by the sender, then the first letter of each word is changed to capital, so that the information sent is the same as that received. The implication of this research is that it is a way to combine cryptography with steganography as an information security technique.
Optimalisasi Literasi Digital sebagai Upaya Menanggulangi Hoax dan Pembangunan Masyarakat Kritis pada Perkumpulan Pemuda Pemudi Kampung Sejahtera Sukartara, Nirwansyah; Ramadhona, M. Rifqi; Monika, Eka Syafrina; Idaman, Akbar; Gunung, Tar Muhammad Raja
Indonesian Journal of Emerging Trends in Community Empowerment Vol. 2 No. 1 (2024): Juni
Publisher : PT Hakhara Akademia Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.71383/ijetce.v2i1.26

Abstract

Kampung Sejahtera is a densely populated area in the river basin of Medan City which often faces challenges in overcoming the spread of false information or hoaxes which can cause confusion and social loss. The lack of digital literacy among their members exacerbates this situation, so efforts are needed to improve their ability to manage digital information effectively. This service aims to optimize digital literacy among Kampung Sejahtera members in order to tackle the spread of hoaxes. Specifically, this service evaluates the current level of digital literacy, identifies types of hoaxes that often circulate, and develops and implements effective digital literacy programs. The effectiveness of the program is evaluated through post-training surveys and observation of member behavior after training. The service shows that members' initial digital literacy level is relatively low, especially in the ability to identify and counter hoaxes. The most frequently spread hoaxes include false information about health, politics and sensational news. After participating in the digital literacy training program, it is hoped that there will be a significant increase in members' ability to recognize and reduce the spread of hoaxes. They become more critical and careful in verifying information before sharing it. Optimizing digital literacy through appropriate training programs has proven effective in tackling hoaxes in Kampung Sejahtera.
Penerapan Metode K-Means untuk Optimalisasi Strategi Bisnis pada TB Rifky Berdasarkan Laris dan Tidak Laris Barang Lubis, Siti Sahara; Gunung, Tar Muhammad Raja; Muis, Abdul; Ningtyas, Alyiza Dwi; Siregar, Manutur Pandapotan
Journal of Information System and Technology (JOINT) Vol. 6 No. 3 (2025): Journal of Information System and Technology (JOINT)
Publisher : Program Sarjana Sistem Informasi, Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/joint.v6i3.11443

Abstract

Penelitian ini bertujuan untuk menganalisis dan mengelompokkan tingkat kelarisan stok barang pada Toko Bangunan (TB) Rifky agar dapat memberikan informasi yang berguna bagi pemilik usaha dalam pengambilan keputusan terkait pengelolaan persediaan dan strategi penjualan. Metode yang digunakan dalam penelitian ini adalah algoritma K-Means, yaitu salah satu metode klasterisasi dalam data mining yang bekerja dengan membagi data ke dalam beberapa kelompok (cluster) berdasarkan tingkat kemiripan antar data. Hasil pengelompokan menghasilkan dua kategori utama, yaitu kelompok barang laris yang terdiri dari Kawat Beton, Kaca, Kuas Cat, dan Kerikil/Split, serta kelompok barang tidak laris yang mencakup Semen, Pasir, Batu Bata, Besi Beton, Kayu, Keramik, dan berbagai bahan bangunan lainnya. Informasi yang diperoleh dari hasil analisis ini diharapkan dapat membantu pemilik TB Rifky dalam mengambil keputusan strategis terkait pengelolaan stok dan peningkatan penjualan. Keterbatasan penelitian ini terletak pada jumlah centroid yang digunakan, yaitu hanya dua (C1 untuk barang laris dan C2 untuk barang tidak laris), sehingga variasi informasi yang dihasilkan masih terbatas.
Smart Skincare: Expert System Based on Certainty Factors for Skin Type Identification and Product Selection Raja Gunung, Tar Muhammad; Ningtyas, Alyiza Dwi; Sitepu, Sengli Egani; Rolanda, Vicky; Jinan, Abwabul
Journal of Embedded Systems, Security and Intelligent Systems Vol 6, No 4 (2025): Desember 2025
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v6i4.10015

Abstract

This study aims to develop an expert system for selecting skincare products based on skin type using the Certainty Factor method. This method is used to represent the expert's level of confidence in the symptoms that appear on the user's skin, so that the system can provide realistic diagnostic results that are close to human thinking. The research data was obtained through consultations with beauty experts and a review of dermatology literature. The test results show that the system is able to identify the user's skin type with varying degrees of certainty. For example, for patients with combination skin types, the system recommends appropriate skincare products such as Salicylic Acid Serum, Elshe Skin Acne Cleansing Wash, and Azarine Acne Gentle Cleansing Foam. Thus, this Certainty Factor-based expert system is expected to help individuals recognize their skin type and choose facial care products more accurately and effectively. Going forward, this system has the potential to be further developed with the integration of artificial intelligence technology and a broader product database to improve the accuracy and personalization of recommendations.