cover
Contact Name
Paska Hasugian
Contact Email
infokum@seaninstitute.org
Phone
+6281264451404
Journal Mail Official
infokum@seaninstitute.org
Editorial Address
Komplek New Pratama ASri Blok C, No.2, Deliserdang, Sumatera Utara, Indonesia
Location
Unknown,
Unknown
INDONESIA
INFOKUM
Published by SEAN INSTITUTE
ISSN : 23029706     EISSN : 27224635     DOI : -
Core Subject : Science,
The INFOKUM a scientific journal of Decision support sistem , expert system and artificial inteligens which includes scholarly writings on pure research and applied research in the field of information systems and information technology as well as a review-general review of the development of the theory, methods, and related applied sciences. Software Engineering. Image Processing Datamining Artificial Neural Networks
Articles 842 Documents
Implementation Of Neural Network With Perceptron Method For Letters Or Text Recognition Ekatri Ayuningsih; Eko Afrianto
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (379.012 KB)

Abstract

Modeling with neural networks is the learning and adjustment of an object. The perceptron method is a learning method with supervision in a neural network system. In designing a neural network that needs to be considered is the number of specifications that will be identified. A neural network consists of a number of neurons and a number of inputs. In identifying some letters, it takes several neurons to distinguish them. These neurons will generate a combination value that is used to identify the letters.so that the resulting network must have parameters that can be set by changing through the rules of learning with supervision. In this case, the identification of letters and numbers will be discussed. Visual basic 6.0 is used to simulate the learning process using the perceptron method
Implementation Of The Linear Congruent Method In Interactive Quiz Games Application Tonni Limbong; Zekson Arizona Matondang
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (604.887 KB)

Abstract

The implementation of the Linear Congruent Method (LCM) in the interactive quiz game based on macromedia selects the suitcase used to generate random numbers. Generating numbers using the linear congruent method uses the formula x(n+1) = (axn+c) mod m. Giving variable values that continue to change greatly affects the game process and can avoid the occurrence of fixed or repeated patterns. In addition, giving a variable that changes can also prevent duplication of questions in a row. Meanwhile, to prevent unwanted random numbers from emitting is to set the variable m as a barrier. From the results of the implementation of the above method in an interactive quiz based on macromedia flash, it can display very varied suitcases that can be played by users with each level of difficulty.
SELECTION OF SCIENCE OLYMPIAN USING ANALYTICAL HIERARCHICAL PROCESS METHODS Dicky Apdilah
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (281.873 KB)

Abstract

Decision Support System is an interactive system, which helps decision makers through the use of data and decision models to solve semi-structured and unstructured problems. Analytical Hierarchy Process (AHP) is a decision support model developed by Thomas L. Saaty, a mathematician. This decision support model will solve complex problems by structuring a hierarchy of criteria, stakeholders, results and by drawing various considerations to develop weights or priorities.
IMPLEMENTATION OF AHP METHOD FOR THE SELECTION OF THE BEST SCHOOLS IN MEDAN CITY BASED ON THE WEBSITE Syarifah Fadillah Rezky; Rita Hamdani; Siti Julianti Siregar
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (229.782 KB)

Abstract

In selecting the best school for prospective students or those who will continue their education. There are many criteria that must be seen from the number of schools in the city of Medan, which is one of the factors determining the quality of the school. Because they only use newspapers and brochures, many prospective students are confused or hesitant in deciding which school to attend. Many schools are often not in accordance with the information contained in the media newspapers and brochures, this of course can be detrimental to prospective students / students who want to enter the school. Thus many prospective students or guardians of students feel doubt in determining which school to choose. Based on previous research regarding the selection of the best schools in journals, "Decision support system to determine favorite private junior high school level using the analytical hierarchy process method" requires a decision support system that is able to provide problem solving to make it easier for prospective students / students to determine the best school so that there is no confusion or doubt in determining the best school . The Analytical Hierarchy Process (AHP) method can test the consistency of assumptions about an alternative in determining the best school, Applications that use the WEB-based Analytical Hierarchy Process (AHP) method is one application that can assist in determining the best school selection, Analytical Hierarchy Process (AHP) is a functional hierarchy with the input name in the form of human perception.
Implementation Of Microtik Os For Optimization Of Bandwidth Management With Per Connection Method At University Of Development Of Panca Budi Medan Muslim
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (729.596 KB)

Abstract

Currently, the need for internet availability has become a very important requirement for the success of a business or organization given the importance of information at this time along with the increasing dependence of humans on the role of information technology. The development of information and data systems will have an impact on increasing the number of internet users which in turn will also have an impact on bandwidth usage. Therefore, it is necessary to do bandwidth management as a form of bandwidth regulation in internet usage on the existing data network so that the data network can function properly, quickly, and professionally. To achieve this, it is necessary to implement bandwidth management using Mikrotik OS with the Per Connection Queue (PCQ) method, either by using the simple queue or queue tree features. The parameters for testing the quality of network services in the implementation of bandwidth management are throughput, delay, jitter, and packet loss. To maximize the application of bandwidth management, the author also needs to make changes to the running network topology. This will certainly make it easier for network administrators to develop networks both physically and logically in the future. The application of the Per Connection Queue method that was carried out at the time of the study was proven to be able to significantly increase the speed of download times carried out by each client on the network. Likewise with the network service quality testing was carried out for the parameters of throughput, delay, jitter.
Smart Door System using Face Recognition Based on Raspberry Pi Fadhillah Azmi; Insidini Fawwaz; Rina Anugrahwaty
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (865.796 KB)

Abstract

A smart door system is a door with a smart digital lock system where someone can open the door or give permission to enter the house by authenticating the user. Basically, the technology used for smart door implementation uses a microcontroller as its controller and is combined with identification in the form of a password. The technology can be combined with other techniques, such as using facial recognition. This is done because data security using alphanumeric combination passwords is no longer used, so it is necessary to add security that is difficult to manipulate by certain people. The type of security offered is facial recognition biometric technology which has different characteristics. This study will design a smart door system that is built using Raspberry Pi-based facial recognition as a controller. The facial recognition algorithm will interact with the webcam and solenoid lock using the Raspberry Pi.Based on the results of the study, it was found that the smart door system with facial recognition can be done well and obtains an accuracy of 94%. The application of the smart door system proposed in this study is considered capable of increasing home security which can be controlled automatically using facial recognition. A smart door system is a door with a smart digital lock system where someone can open the door or give permission to enter the house by authenticating the user. Basically, the technology used for smart door implementation uses a microcontroller as its controller and is combined with identification in the form of a password. The technology can be combined with other techniques, such as using facial recognition. This is done because data security using alphanumeric combination passwords is no longer used, so it is necessary to add security that is difficult to manipulate by certain people. The type of security offered is facial recognition biometric technology which has different characteristics. This study will design a smart door system that is built using Raspberry Pi-based facial recognition as a controller. The facial recognition algorithm will interact with the webcam and solenoid lock using the Raspberry Pi.Based on the results of the study, it was found that the smart door system with facial recognition can be done well and obtains an accuracy of 94%. The application of the smart door system proposed in this study is considered capable of increasing home security which can be controlled automatically using facial recognition.
An Analysis Of Solar Energy Potential Based On Methods Weibull And Reyleigh Using Data From Weather Station Selly Annisa Binti Zulkarnain; Suwarno; Muhammad Fitra Zambak
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (697.687 KB)

Abstract

Electrical energy is the primary need of the Indonesian people. Most of the electrical energy used comes from fossil energy such as fuel oil, gas, and coal. Fossil fuels themselves can cause environmental damage and include non-renewable energy, so it is necessary to study the potential for power plant development using alternative energy. This study discusses the analysis of the energy potential of natural resources, namely sunlight. Where the energy potential is carried out using 2 methods, namely the Weibull distribution and the Rayleigh distribution. The results showed that the Weibull distribution gave more accurate results than the Rayleigh distribution. It is known from the Mean square error value of the Weibull distribution that it was 6.4% in 2013 and 9.3% in 2014, and from the Rayleigh distribution, it was obtained 9% in 2013 and 18% in 2014.
Combination of Shamir Adleman's Elgamal Rivest Algorithm and Least Significant Bit in Securing Files Jerri Pradana Sikumbang; Sriani
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (974.184 KB)

Abstract

The security condition of a file can be determined by means of several algorithms. So far, the identification of file security levels generally only uses the Google Drive link. Such security will take relatively fast time to be hacked by illegal data thieves and because it generally has limitations in file security. Knowing a link by the sender of the file can be retrieved by data thieves. It takes a system that is able to carry out the encryption process objectively, consistently and with clearer results. One of them is the segmentation process using the Elgamal RSA and LSB algorithms. The combination process aims to further secure the Combination of the RSA and LSB Elgamal algorithm combination files to encrypt data with more complicated calculations. From the results of data encryption into the image the sender file provides only the image, the recipient can retrieve a pdf of the image, even if the image is spread on the internet the data will be safe. Because retrieving data from the image requires the privacy key of the sender of the file and decrypts the calculation of the RSA and LSB Elgamal algorithm combination.
Application Of Security System Of Motorcycle Used Fingerprint Optical Sensor And Vibration Sensor With Fuzzy Logic Based On Arduino Uno R3 Mhd Furqan; Muhammad Ikhsan; Abdul Halim Hasugian; Muhammad Ridzki Hasibuan
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (675.606 KB)

Abstract

The Increasing case of motorcycle theft in North Sumatera and lack of human control of safety locks is an important factor for every motorcycle owner to ad dual security system. The research aimed to add double protection of the motorcycle by utilizing the advantages of the Fingerprint sensor plus a vibrating sensor SW-420 and IR Proximity sensor which is controlled by a microcontroller with fuzzy logic as process logic. The fuzzy logic used to produce the output of motorcycle condition which is silent, shifted by early is the alarm if there are the other individuals who try ignite or move the motorcycle position. The microcontroller is used to control relay based on verification results from Fingerprint optical sensor FPM10A module as well as do the process of fuzzy logic at vibrating sensor SW-420 module and IR Proximity sensor then it will produce the alarm output is sound. These protection system tools can increase the safety of the motorcycle owner.
Digital Image Security System Using Spritz Algorithm Mhd Furqan; Rakhmat Kurniawan; Abdul Halim Hasugian; Imam Zaki Husein Nst
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (816.652 KB)

Abstract

Private and confidential digital imagery is particularly vulnerable to eavesdropping by irresponsible parties. Especially when distributed through the internet network such as on facebook chat-based applications, whatsapp and e-mail media. The image sent is sometimes often an image that is confidential and must be maintained security. In order to maintain the security of digital imagery can be done with the use of cryptographic techniques. Cryptographic techniques can secure digital images by changing the pixel values of the digital image so as to produce pixel values that are different from the original image to be secured. The research will use the Spritz algorithm for encryption and decryption of digital images in image security applications. The result of the Spritz Algorithm's encryption results in pixel values that are much different from the original pixel values. So that the image of encryption is more secure to be distributed through intermediary media.

Filter by Year

2018 2026


Filter By Issues
All Issue Vol. 14 No. 02 (2026): Infokum, March-April 2026 Vol. 14 No. 01 (2026): Infokum, January - February 2026 Vol. 13 No. 06 (2025): Infokum Vol. 13 No. 05 (2025): Infokum Vol. 13 No. 04 (2025): Infokum Vol. 13 No. 03 (2025): Infokum Vol. 13 No. 02 (2025): Infokum Vol. 13 No. 01 (2025): Infokum Vol. 12 No. 04 (2024): Engineering, Computer and Communication, November 2024 Vol. 12 No. 01 (2024): Engineering, Computer and Communication, Edition January 2024 Vol. 11 No. 05 (2023): Engineering, Computer and Communication Vol. 11 No. 04 (2023): Agustus : Engineering, Computer and Communication Vol. 11 No. 03 (2023): Juni : Engineering, Computer and Communication Vol. 11 No. 02 (2023): April, Engineering, Computer and Communication Vol. 10 No. 03 (2022): August, Data Mining, Image Processing, and artificial intelligence Vol. 10 No. 02 (2022): Juni, Data Mining, Image Processing, and artificial intelligence Vol. 10 No. 5 (2022): December, Computer and Communication Vol. 10 No. 4 (2022): October, computer, information and engineering Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence Vol. 9 No. 2, June (2021): Data Mining, Image Processing and artificial intelligence Vol. 9 No. 1,Desember (2020): Data Mining, Image Processing,artificial intelligence, networking Vol. 8 No. 2, Juni (2020): Data Mining, Image Processing and artificial intelligence Vol. 8 No. 1, Desembe (2019): Data Mining,Image Processing and artificial intelligence Vol. 7 No. 2, Juni (2019): Data Mining And Image Processing Vol. 7 No. 1, Desembe (2018): Data Mining And Image Processing More Issue