Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : INFOKUM

Decision Support System in Determining Call Center Staff Using VIKOR Method Roy Frensal Baringbing; Zulfahmi Syahputra; Eko Hariyanto
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (939.945 KB)

Abstract

Call center staff is a staff who works in providing repair services or service by telephone. This staff is in charge of explaining the solutions that will be carried out by the company in getting answers. Call center staff must have good manners and be smart. In getting good staff, companies can use a decision support system with the VIKOR method in determining and selecting these staff. Five criteria will be tested in determining the staff. The results of the VIKOR method can help companies in getting call center staff according to company expectations. The ranking results can determine the level of results from the VIKOR method test on call center staff who are used as candidates or alternatives. By applying this method, the search for call center staff will be better.
IMPLEMENTATION OF THE K-NEAREST NEIGHBOR METHOD IN KNOWING WATER QUALITY David Nico L Nainggolan; Eko Hariyanto; Arpan Arpan
INFOKUM Vol. 10 No. 02 (2022): Juni, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (255.642 KB)

Abstract

The function of classification is the process carried out in predicting a data that has a class that is still unknown, the pattern that is owned is also already regular in a classification method. K-NN is a group that has an instances-based learning system, in conducting group searches by performing the value of k objects into the test with the closest value to the value of other data. KNN uses the closest distance value to the tested dataset in carrying out the classification process. Drinking water is very important for health and is a very effective component for the health of the human body. Health is very influential on the country's economy, it is necessary to invest in water that is very beneficial for the community. This study conducted a search for accuracy of water quality with data as many as 3276 different bodies of water in order to know which water can be drunk and not drinkable. The results of the accuracy of the KNN classification model that can increase the level of accuracy better for the data used. So the research on water quality has an accuracy of 56.40% with 370 data on drinkable water. Researchers hope that accuracy can be improved again by combining the optimization of the classification model in future studies
APPLICATION OF CRT (CHINESE REMINDER THEOREM) TO SPEED UP THE PROCESS OF DATA SECURITY ON IMAGE FILES Syaufi Arbin; Arpan; Eko Hariyanto
INFOKUM Vol. 10 No. 02 (2022): Juni, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (363.322 KB)

Abstract

The purpose of this study is to use the Chinese Remainder Theorem approach to create a data security application system and to improve the data security of a confidential file, particularly data that uses image files. Observation and literature review were employed in this study to acquire data. The traditional approach is used to share data, in this case a secret message in the form of text. The embedding process and the extraction process are the two fundamental procedures in message insertion utilizing the Least Significant Bit approach. The Least Significant Bit steganography technique was used to replace the secret message bits in the final bit of each color component of the image pixels, according to the results. So that the image size does not change, only one message bit (value 0 or 1) is placed into one color component of the image. Furthermore, the processing time is affected by the size of the file, the length of the key, and the computer processor performance.