JURNAL MEDIA INFORMATIKA BUDIDARMA
Decission Support System, Expert System, Informatics tecnique, Information System, Cryptography, Networking, Security, Computer Science, Image Processing, Artificial Inteligence, Steganography etc (related to informatics and computer science)
Articles
1,182 Documents
Aplikasi Diagnosa Granulomatous Dermatis Menggunakan Certainty Factor
Puji Sari Ramadhan
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 3, No 2 (2019): April 2019
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/mib.v3i2.1064
Granulomatous dermatitis is a type of inflammatory disease in the inner layer of the skin that causes damage to the nerves, skin layers and motor members of the body. This disease originated in the attack of an aerobic type of mycobacterium leprae which can spread and transmit infection by contact and air, besides this disease is estimated to enter Indonesia in the early V century. At present the diagnosis and treatment of Granulomatous Dermatis is experiencing difficulties, this based on the limited information and lack of knowledge of the community about Granulomatous Dermatis so that later it will result in late or unpreparedness of treatment in patients with Granulomatous Dermatis cases. On the basis of these events, it is very necessary to build a system by acquiring scientific concepts of artificial intelligence that are capable of producing an Expert System which can later be used to diagnose Granulomatous Dermatis by applying the Certainty Factor analysis. With the application of this diagnosis later can help the community and medical experts in diagnosing Granulomatous Dermatis as a reference tool in concluding the final diagnosis.
Perancangan Keamanan Server Linux Dengan Metode Hardening Pada Layer 1 dan Layer 7
Maraghi Agil Prabowo;
Ucuk Darusalam;
Sari Ningsih
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 4, No 3 (2020): Juli 2020
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/mib.v4i3.2157
Many person or institutions are still not aware of security on a server, not only rely on IDS and IPS applications and some firewall applications that we can easily find through internet networks. Special security handling is required on servers that are not related to third-party applications. The security design can be implemented through kernel configuration and tweaks that can be done by relying on the default application of an operating system. These applications are very common and can be found in almost all types of Linux server distributions. And there are still many people who do not maximize the security provided by the BIOS (Basic Input Output System) so that the operating system that has been installed and the data stored therein can be easily accessed by parties who are not responsible. Than as a preventive measure so that the data stored can not be accessed haphazardly by people who are not responsible, provided encryption and the sharing of system files that will be installed on the server. In the security steps for account access, the password that is created will be expired and the user cannot use the old password that he has used before
Analisa dan Perbandingan Performa Tools Forensik Digital pada Smartphone Android menggunakan Instant Messaging Whatsapp
Ilhami Algi Plianda;
Rini Indrayani
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 6, No 1 (2022): Januari 2022
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/mib.v6i1.3487
Technology services are currently developing rapidly, one of the services that rapidly increased is the development of Instant messaging (IM) technology which is increasingly sophisticated and cannot be separated from people's lives. However, the use of this technology is not always about activities that have a good impact but are also vulnerable to being used as a medium to do harmful things. One of the things that have a detrimental impact that often occurs is cybercrime by utilizing Instant messaging (IM) applications. One of the IM platforms that is often used as a media for cybercrime is WhatsApp. The message deletion feature can be one of the feature that uses criminals to hide evidence of a crime. Therefore, a digital forensic protocol is needed that can help the authorities to uncover evidence of crimes that have been tried to eliminate by criminals. Therefore, this study raises the issue of research utilizing the Whatsapp platform using two tools, namely MOBILedit and Oxygen Forensic. The final result of this research is a method and tool recommendation that can be the best alternative for digital forensics needs.
Pemodelan Arsitektur Sistem Informasi untuk Mendukung Aktivitas Akademik di STIMIKOM Stella Maris Sumba
Yulius Nahak Tetik;
Wing Wahyu Winarno;
Eko Pramono
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 3, No 3 (2019): Juli 2019
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/mib.v3i3.1202
Information technology and information systems are a very fundamental requirement in supporting business functions in an organization or company, whether government or private. Amid the rapid development of information technology, universities are challenged to implement information technology and information systems that can facilitate and accelerate services, both to students, lecturers and the general public in terms of obtaining information. In developing information systems, there needs to be careful planning for the short, medium and long term so that the system that has been built can continue to be developed together with the construction of a new system. Enterprise Architecture Planning is a methodology that can be used to build a structured system architecture starting from planning to the implementation planning stage. In this journal, we will discuss the use of Enterprise Architecture Planning in creating information system architecture to support academic activities in the form of data architecture, applications and technology
Implementasi Enkripsi-Dekripsi dengan Algoritma RC2 Menggunakan Java
Muhammad Iqbal Assegaf;
Rahma Destias;
Nidhea Sitaresmi;
Yudi Wiharto
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 4, No 4 (2020): Oktober 2020
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/mib.v4i4.2256
Cryptography is a security tool used to hide a message. For that we need a security by means of encryption and decryption of data using cryptographic algorithms Rivest Code 2 (RC2). In the cryptographic algorithms Rivest Code 2 (RC2), designed in java programming netbeans which include the ability to operate directly for RC2 algorithm implemented by mode. Specifications architectures and languages into a specified algorithm implementation does not yet support 64-bit operating efficiently. Therefor, instead of using two 64-bit registers as in RC2, RC2 uses four 32-bit registers. Because it uses four registers there will be two rotation operation on each half-round there, and it will also be a lot of bits that will be used to affect the number of bits that are rotated. This multiplication operation is very effective in producing the effect of diffusion or which of course resulted in the deployment of more secure RC2. Android-based application that is generated by utilizing the latest technology
Sistem Aplikasi Penilaian Jawaban Essay Test Calon Karyawan PT Siloam Hospitals TB Simatupang Menggunakan Algoritma Text Mining TF-IDF Berbasis Web
Agung Daniel Sipayung;
Fauziah Fauziah;
Nurhayati Nurhayati
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 4, No 4 (2020): Oktober 2020
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/mib.v4i4.2202
The computer is a sophisticated technology that is widely used for now, a lot of work that used to use manual processes, has now been replaced by a computerized system, one example is the process of evaluating answers to essay tests online, the process of evaluating answers to essay tests that the authors currently use is by using the Tf-Idf text mining algorithm, which application system is a model for evaluating the essay test answers for prospective employees at PT. Siloam Hospitals TB Simatupang. The aim is to accelerate the process of evaluating essay test answers to prospective employees at PT. Siloam Hospitals TB Simatupang. In order to make the same frequency between several words in the sentence that can be used Term Frequency equation, Term Frequency is a factor that can determine word weight based on the number of word frequencies in each document, 4 sample essay questions are taken , the results can be if the prospective employee correctly solved the problem and the result or the value of the equation is 1, the value obtained by the prospective employee is 100: 4 = 25. From the results of the study that the essay test assessment system using text mining methods has worked well in the application Essay examination trials show the suitability of the assessment in the application with the scores made by HRD with an average of 73.51%
Peramalan Produksi Serundeng Kentang dengan Fuzzy Tsukamoto
Eka Praja Wiyata Mandala;
Dewi Eka Putri
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 4, No 3 (2020): Juli 2020
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/mib.v4i3.2238
Production is a very important process for a business that produces products. In a culinary business, for example, production is a determining factor so that the culinary products produced can be distributed to stores for sale. The culinary business is mostly done by small and medium businesses. One of them is UKM Yandi which a produces potato flakes as its culinary products. UKM Yandi distributes a potato flakes to 10 minimarkets in Padang every week. The problem that occurs is often the amount of production is greater than the demand of the minimarket while the remaining stock in the minimarket is still large, so there is often a buildup of products on the minimarket because it is not sold. This research provides a solution for UKM Yandi to forecast the production of potato flakes using the Fuzzy Tsukamoto approach, using input variables, the remaining stock at the minimarket in the previous week and the request submitted by the minimarket for the following week, while the output variable is the amount of production carried out by UKM Yandi. This research makes a web-based application that can be used by UKM Yandi owners to forecast the production of potato flakes, so they can be accessed from anywhere. The results of this research are able to help and facilitate UKM Yandi in forecasting the production of potato flakes because it produces a number with a certain number of packets to be produced
Perancangan Pembelajaran Bangun Ruang 3 Dimensi Berbasis Android
Imam Abdurrahman;
Ucuk Darusalam;
Benrahman Benrahman
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 4, No 1 (2020): Januari 2020
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/mib.v4i1.1894
Teaching aids for learning to Build Space now still depend on the old way, namely by still using 2-Dimensional media. Teachers such as Teachers still have difficulty making visual tools to learn the material of Building 3 Dimensions. And students still find it difficult to learn and explore the material to Build Space delivered by the teaching staff, with its limitations and lack of visual tools they can only imagine what the shape of the Space Build is like. With that, the author tries to make interactive learning applications so that geometric models such as cubes, tubes, cones, pyramids and balls can foster interest in learning mathematics at elementary school level by utilizing Augmented Reality (AR) technology, which is technology that merge two-dimensional or three-dimensional virtual objects into a real environment and then project these virtual objects in real time. One of the materials in learning mathematics for fifth grade elementary school students is Build Space. If you pay attention to the average age of elementary school students in class V is at the age of 10-11 years. The author obtained the final results of the study in the form of learning to Build 3-Dimensional Space with the Virtual Button method and test results from Smartphone Xiaomi Redmi 4 devices with a minimum distance of ± 15cm and a maximum of ± 81cm. Testing the response speed <1 second, the Xiaomi Redmi 4 Smartphone shows better results than other smartphones.
DATA MINING UNTUK MEMPREDIKSI JENIS TRANSAKSI NASABAH PADA KOPERASI SIMPAN PINJAM DENGAN ALGORITMA C4.5
Hikma Widayu;
Surya Darma Nasution;
Natalia Silalahi;
Mesran Mesran
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 1, No 2 (2017): Juni 2017
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/mib.v1i2.323
In the field of business, data mining techniques are used to support a wide range of business intelligence applications such as customer profiling, targeted marketing, workflow management, store layout and fraud detection. Lack of predicting the type of Customer Transactions that exist in this cooperative makes the manager or leader of this cooperative difficult in terms of providing loans and also in accepting new cooperative members. Leaders also have difficulties in knowing the profession of customers who borrow the most at this cooperative. As for the process of predicting the type of Customer Transaction during this time, there is a saving and loan operation is still based on the direct view of the type of Customer Transaction and see the existing ledger notes of the cooperative.
Penerapan Algoritma Naïve Bayes Untuk Pengelompokkan Predikat Peserta Uji Kemahiran Berbahasa Indonesia
Michal Dennis;
Rahmaddeni Rahmaddeni;
Fransiskus Zoromi;
M. Khairul Anam
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 6, No 2 (2022): April 2022
Publisher : STMIK Budi Darma
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.30865/mib.v6i2.3956
Indonesian Language Proficiency Test is a proficiency test to measure a person's language proficiency in communicating using Indonesian, both Indonesian speakers and foreign speakers. The UKBI rating has 7 rating categories consisting of special, very excellent, excellent, intermediate, poor, marginal, and limited. The number of participants who take UKBI at the Riau Province Language Center has more than 1000 but no one has managed the data into new knowledge. One of the efforts that can be done with the data is classification. The Naïve Bayes Classification Algorithm is a classification algorithm that is very effective (getting the right results) and efficient (the reasoning process is carried out by utilizing existing inputs in a relatively fast way). In order to obtain good accuracy results, the Naive Bayes Algorithm is combined with the Adaboost feature selection with a 70:30 and 80:20 test scheme. The results of the research carried out resulted in the highest accuracy value, namely 89% which combined the Naive Bayes algorithm with the Adaboost feature selection with 70:30 data splitting