cover
Contact Name
Paska Hasugian
Contact Email
infokum@seaninstitute.org
Phone
+6281264451404
Journal Mail Official
infokum@seaninstitute.org
Editorial Address
Komplek New Pratama ASri Blok C, No.2, Deliserdang, Sumatera Utara, Indonesia
Location
Unknown,
Unknown
INDONESIA
INFOKUM
Published by SEAN INSTITUTE
ISSN : 23029706     EISSN : 27224635     DOI : -
Core Subject : Science,
The INFOKUM a scientific journal of Decision support sistem , expert system and artificial inteligens which includes scholarly writings on pure research and applied research in the field of information systems and information technology as well as a review-general review of the development of the theory, methods, and related applied sciences. Software Engineering. Image Processing Datamining Artificial Neural Networks
Articles 96 Documents
Search results for , issue "Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence" : 96 Documents clear
IMPLEMENTATION OF AHP METHOD FOR THE SELECTION OF THE BEST SCHOOLS IN MEDAN CITY BASED ON THE WEBSITE Syarifah Fadillah Rezky; Rita Hamdani; Siti Julianti Siregar
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (229.782 KB)

Abstract

In selecting the best school for prospective students or those who will continue their education. There are many criteria that must be seen from the number of schools in the city of Medan, which is one of the factors determining the quality of the school. Because they only use newspapers and brochures, many prospective students are confused or hesitant in deciding which school to attend. Many schools are often not in accordance with the information contained in the media newspapers and brochures, this of course can be detrimental to prospective students / students who want to enter the school. Thus many prospective students or guardians of students feel doubt in determining which school to choose. Based on previous research regarding the selection of the best schools in journals, "Decision support system to determine favorite private junior high school level using the analytical hierarchy process method" requires a decision support system that is able to provide problem solving to make it easier for prospective students / students to determine the best school so that there is no confusion or doubt in determining the best school . The Analytical Hierarchy Process (AHP) method can test the consistency of assumptions about an alternative in determining the best school, Applications that use the WEB-based Analytical Hierarchy Process (AHP) method is one application that can assist in determining the best school selection, Analytical Hierarchy Process (AHP) is a functional hierarchy with the input name in the form of human perception.
Implementation Of Microtik Os For Optimization Of Bandwidth Management With Per Connection Method At University Of Development Of Panca Budi Medan Muslim
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (729.596 KB)

Abstract

Currently, the need for internet availability has become a very important requirement for the success of a business or organization given the importance of information at this time along with the increasing dependence of humans on the role of information technology. The development of information and data systems will have an impact on increasing the number of internet users which in turn will also have an impact on bandwidth usage. Therefore, it is necessary to do bandwidth management as a form of bandwidth regulation in internet usage on the existing data network so that the data network can function properly, quickly, and professionally. To achieve this, it is necessary to implement bandwidth management using Mikrotik OS with the Per Connection Queue (PCQ) method, either by using the simple queue or queue tree features. The parameters for testing the quality of network services in the implementation of bandwidth management are throughput, delay, jitter, and packet loss. To maximize the application of bandwidth management, the author also needs to make changes to the running network topology. This will certainly make it easier for network administrators to develop networks both physically and logically in the future. The application of the Per Connection Queue method that was carried out at the time of the study was proven to be able to significantly increase the speed of download times carried out by each client on the network. Likewise with the network service quality testing was carried out for the parameters of throughput, delay, jitter.
Smart Door System using Face Recognition Based on Raspberry Pi Fadhillah Azmi; Insidini Fawwaz; Rina Anugrahwaty
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (865.796 KB)

Abstract

A smart door system is a door with a smart digital lock system where someone can open the door or give permission to enter the house by authenticating the user. Basically, the technology used for smart door implementation uses a microcontroller as its controller and is combined with identification in the form of a password. The technology can be combined with other techniques, such as using facial recognition. This is done because data security using alphanumeric combination passwords is no longer used, so it is necessary to add security that is difficult to manipulate by certain people. The type of security offered is facial recognition biometric technology which has different characteristics. This study will design a smart door system that is built using Raspberry Pi-based facial recognition as a controller. The facial recognition algorithm will interact with the webcam and solenoid lock using the Raspberry Pi.Based on the results of the study, it was found that the smart door system with facial recognition can be done well and obtains an accuracy of 94%. The application of the smart door system proposed in this study is considered capable of increasing home security which can be controlled automatically using facial recognition. A smart door system is a door with a smart digital lock system where someone can open the door or give permission to enter the house by authenticating the user. Basically, the technology used for smart door implementation uses a microcontroller as its controller and is combined with identification in the form of a password. The technology can be combined with other techniques, such as using facial recognition. This is done because data security using alphanumeric combination passwords is no longer used, so it is necessary to add security that is difficult to manipulate by certain people. The type of security offered is facial recognition biometric technology which has different characteristics. This study will design a smart door system that is built using Raspberry Pi-based facial recognition as a controller. The facial recognition algorithm will interact with the webcam and solenoid lock using the Raspberry Pi.Based on the results of the study, it was found that the smart door system with facial recognition can be done well and obtains an accuracy of 94%. The application of the smart door system proposed in this study is considered capable of increasing home security which can be controlled automatically using facial recognition.
An Analysis Of Solar Energy Potential Based On Methods Weibull And Reyleigh Using Data From Weather Station Selly Annisa Binti Zulkarnain; Suwarno; Muhammad Fitra Zambak
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (697.687 KB)

Abstract

Electrical energy is the primary need of the Indonesian people. Most of the electrical energy used comes from fossil energy such as fuel oil, gas, and coal. Fossil fuels themselves can cause environmental damage and include non-renewable energy, so it is necessary to study the potential for power plant development using alternative energy. This study discusses the analysis of the energy potential of natural resources, namely sunlight. Where the energy potential is carried out using 2 methods, namely the Weibull distribution and the Rayleigh distribution. The results showed that the Weibull distribution gave more accurate results than the Rayleigh distribution. It is known from the Mean square error value of the Weibull distribution that it was 6.4% in 2013 and 9.3% in 2014, and from the Rayleigh distribution, it was obtained 9% in 2013 and 18% in 2014.
Combination of Shamir Adleman's Elgamal Rivest Algorithm and Least Significant Bit in Securing Files Jerri Pradana Sikumbang; Sriani
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (974.184 KB)

Abstract

The security condition of a file can be determined by means of several algorithms. So far, the identification of file security levels generally only uses the Google Drive link. Such security will take relatively fast time to be hacked by illegal data thieves and because it generally has limitations in file security. Knowing a link by the sender of the file can be retrieved by data thieves. It takes a system that is able to carry out the encryption process objectively, consistently and with clearer results. One of them is the segmentation process using the Elgamal RSA and LSB algorithms. The combination process aims to further secure the Combination of the RSA and LSB Elgamal algorithm combination files to encrypt data with more complicated calculations. From the results of data encryption into the image the sender file provides only the image, the recipient can retrieve a pdf of the image, even if the image is spread on the internet the data will be safe. Because retrieving data from the image requires the privacy key of the sender of the file and decrypts the calculation of the RSA and LSB Elgamal algorithm combination.
Application Of Security System Of Motorcycle Used Fingerprint Optical Sensor And Vibration Sensor With Fuzzy Logic Based On Arduino Uno R3 Mhd Furqan; Muhammad Ikhsan; Abdul Halim Hasugian; Muhammad Ridzki Hasibuan
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (675.606 KB)

Abstract

The Increasing case of motorcycle theft in North Sumatera and lack of human control of safety locks is an important factor for every motorcycle owner to ad dual security system. The research aimed to add double protection of the motorcycle by utilizing the advantages of the Fingerprint sensor plus a vibrating sensor SW-420 and IR Proximity sensor which is controlled by a microcontroller with fuzzy logic as process logic. The fuzzy logic used to produce the output of motorcycle condition which is silent, shifted by early is the alarm if there are the other individuals who try ignite or move the motorcycle position. The microcontroller is used to control relay based on verification results from Fingerprint optical sensor FPM10A module as well as do the process of fuzzy logic at vibrating sensor SW-420 module and IR Proximity sensor then it will produce the alarm output is sound. These protection system tools can increase the safety of the motorcycle owner.
Digital Image Security System Using Spritz Algorithm Mhd Furqan; Rakhmat Kurniawan; Abdul Halim Hasugian; Imam Zaki Husein Nst
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (816.652 KB)

Abstract

Private and confidential digital imagery is particularly vulnerable to eavesdropping by irresponsible parties. Especially when distributed through the internet network such as on facebook chat-based applications, whatsapp and e-mail media. The image sent is sometimes often an image that is confidential and must be maintained security. In order to maintain the security of digital imagery can be done with the use of cryptographic techniques. Cryptographic techniques can secure digital images by changing the pixel values of the digital image so as to produce pixel values that are different from the original image to be secured. The research will use the Spritz algorithm for encryption and decryption of digital images in image security applications. The result of the Spritz Algorithm's encryption results in pixel values that are much different from the original pixel values. So that the image of encryption is more secure to be distributed through intermediary media.
Clustering Potato Seeds Using DBSCAN Algorithm in Optimizing Sales N P Dharshinni; Andre Putra Persada Tarigan
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (817.013 KB)

Abstract

Potato seed shop CV. ASAP sells various types of potato seeds which are quite trusted by potato farmers. The payment methods used so far are cash and credit payments, but the shop owner never has a balanced stock so that customer demand is always not in accordance with the stock of seeds, resulting in the shop is at a loss. Based on the problems experienced by potato farmers, it is necessary to group potato seed sales data using the DBSCAN clustering algorithm. The DBSCAN algorithm groups sales data into several cluster groups based on epsilon values and minimal points, besides that this algorithm can detect noise in data grouping so that the grouping results obtained are better than other algorithms. The purpose of this study was to apply the DBSCAN algorithm to potato seedling sales data to obtain results in knowing the types of potato seeds that were most purchased by customers from potato seed sales with cash payment methods and credit payments. The results of the application of the DBSCAN algorithm found that the most purchased by customers using the cash payment method were the type of spread seeds, class D potato seeds, class A potato seeds, and class C potato seeds with the test value of epsilon 1,2 and Minimum points 1 while the sale of seeds Potatoes, the most purchased by a customer using credit payment method are the type of potato produced by class C and potato spread seeds with the test value of Epsilon 2 and Minimum points 1.
Implementation Of Watermarking Using The Singular Value Decomposition Method Satria Yudha Prayogi; Sony Bahagia Sinaga
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (278.832 KB)

Abstract

Technological developments have made it easy for the distribution of digital data (such as text, images, audio, and video) both with disk media and through internet media. On the other hand, this convenience can cause problems with copyright protection. One technique to overcome this problem is to insert a sign (watermark) as proof of ownership into digital data known as watermarking. Watermarks can be inserted into the spatial domain or the frequency domain. In general, watermarking in the frequency domain is more resistant to attacks than watermarking in the spatial domain. The watermarking method used in this study uses a transformation domain, namely Singular Value Decomposition (SVD). Tests used to provide a blurring effect). Where the technique using Singular Value Decomposition (SVD) is generally inserted into singular values based on the consideration that the singular value will not experience significant changes if there is a slight disturbance in the image.
Noise Reduction Using Gaussian, Mean, And Median Filter To Improve Ultrasonography Image Quality Mhd. Furqan nasution; Sriani; Ilham Fuadi Nasution
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1170.862 KB)

Abstract

Ultrasound images are captured using high-frequency sound waves to create images with dark and bright spots throughout the subject. In this case, the resulting image will look blurry and some blobs will cause less information on the image. Degraded image quality due to noise. Noise can be caused by physical interference in the acquisition tool or by deliberate mishandling. Due to these problems, there is a need for a system that can enhance ultrasound images by minimizing existing noise. However, many methods have been developed to perform image enhancement by removing noise, which makes one method confusing with which method to use. Therefore, in this study, different methods for removing noise in ultrasound images, such as Gaussian filtering, mean and median, were compared to determine which method is better. The comparison of the three methods is based on PSNR and MSE values. Applied research results show that the median filtering method outperforms Gaussian and Mean methods in reducing noise in USG images to 60%.

Page 5 of 10 | Total Record : 96


Filter by Year

2021 2021


Filter By Issues
All Issue Vol. 14 No. 02 (2026): Infokum, March-April 2026 Vol. 14 No. 01 (2026): Infokum, January - February 2026 Vol. 13 No. 06 (2025): Infokum Vol. 13 No. 05 (2025): Infokum Vol. 13 No. 04 (2025): Infokum Vol. 13 No. 03 (2025): Infokum Vol. 13 No. 02 (2025): Infokum Vol. 13 No. 01 (2025): Infokum Vol. 12 No. 04 (2024): Engineering, Computer and Communication, November 2024 Vol. 12 No. 01 (2024): Engineering, Computer and Communication, Edition January 2024 Vol. 11 No. 05 (2023): Engineering, Computer and Communication Vol. 11 No. 04 (2023): Agustus : Engineering, Computer and Communication Vol. 11 No. 03 (2023): Juni : Engineering, Computer and Communication Vol. 11 No. 02 (2023): April, Engineering, Computer and Communication Vol. 10 No. 03 (2022): August, Data Mining, Image Processing, and artificial intelligence Vol. 10 No. 02 (2022): Juni, Data Mining, Image Processing, and artificial intelligence Vol. 10 No. 5 (2022): December, Computer and Communication Vol. 10 No. 4 (2022): October, computer, information and engineering Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence Vol. 9 No. 2, June (2021): Data Mining, Image Processing and artificial intelligence Vol. 9 No. 1,Desember (2020): Data Mining, Image Processing,artificial intelligence, networking Vol. 8 No. 2, Juni (2020): Data Mining, Image Processing and artificial intelligence Vol. 8 No. 1, Desembe (2019): Data Mining,Image Processing and artificial intelligence Vol. 7 No. 2, Juni (2019): Data Mining And Image Processing Vol. 7 No. 1, Desembe (2018): Data Mining And Image Processing More Issue