TIN: TERAPAN INFORMATIKA NUSANTARA
Jurnal TIN: TERAPAN INFORMATIKA NUSANTARA memuat tentang Kajian Bunga Rampai dari berbagai ide dan hasil penelitian para peneliti, mahasiswa, dan dosen yang berkompeten di bidangnya dari berbagai disiplin ilmu seperti: Komputer, Informatika, Industri, Elektro, Telekomunikasi, Kesehatan, Agama, Pertanian, Pembelajaran, Pendidikan, Teknologi Pendidikan, Ekonomi dan Bisnis, Manajemen, Akuntansi, dan Hukum
Articles
503 Documents
Implementasi Shuffling Algoritma Dalam Tes Ujian Masuk Peserta Didik Baru di SMA Swasta An-Nizam
Harahap, Muhammad Soleh
TIN: Terapan Informatika Nusantara Vol 1 No 7 (2020): Desember 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The exam is one way to evaluate the learning process. In the world of exam education is intended to measure the level of achievement of a teaching goal and a learning process so that students or students and related institutions can know the level of ability in understanding the field of study that has been taken. In this study the author will try to build an online examination system in which the Fisher-Yates algorithm is applied for randomization of the questions. The system is designed to only apply the process of randomizing the test questions and the randomization process so that different questions can be issued.
Implementasi Metode GOST(Government Standard) dan LSB-1(Least Significant Bit) Untuk Mengamankan Teks
Diana, Mia
TIN: Terapan Informatika Nusantara Vol 1 No 7 (2020): Desember 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Securing text data is one of the activities carried out so that the text of an information is kept confidential so that it cannot be known by others except those who are entitled to it. One technique that can be done to optimize the security of text data is to combine cryptographic techniques with the steganography technique. Cryptographic techniques function to encode text data that is kept secret through the encryption process. While the steganography technique serves to hide (embedding) encrypted text data into a media such as image, video, audio. This study describes the process of combining cryptographic techniques and steganography techniques in securing sent text. Cryptographic techniques are used to encode secret messages based on the GOST (Government Standard) method and the steganography technique is used to hide encrypted text into a digital image based on the LSB-1 (Least significant bit-1) algorithm. In order to make the process easier, a secret text security application was built using Visual Basic 2008 programming language
Penerapan Scoring System Dalam Penilaian Latihan Pemahaman Materi Toefl
Azharuddin, Muhammad
TIN: Terapan Informatika Nusantara Vol 1 No 8 (2020): Januari 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Nowadays, computer skills can be used in various fields to teach, provide information, and provide entertainment. Computers can also be used to assist in the teaching and learning process. To facilitate the delivery of material, it can be packaged attractively in the form of an Android-based application, which is educational and entertaining for students. The topic of this discussion is the design of the toefl understanding training application using the Android-based scoring system method. Where to use this application can help students in learning computerized toefl material. Therefore the authors apply the scoring system method to determine the scores and categories in the toefl assessment, there are three categories, namely less good, good and very good. The purpose of this study was to design an Android-based toefl material application, where the training scores were implemented using the scoring system method. This application will make it easier for students to learn toefl, because the application system is already in the form of android so that it adds to the attractiveness of students.
Penerapan Metode Brown Gibson Dalam Menentukan Penerima Kalpataru
Harahap, Yudi Arta
TIN: Terapan Informatika Nusantara Vol 1 No 8 (2020): Januari 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The implementation of the Brown Gibson method in determining kalpataru recipients is done by choosing an alternative that follows a series of stages of activities given and criteria that are suitable for kalpataru recipients. The problem faced by the selection team or the Kalpataru consideration board is how to determine the Kalpataru recipient from a number of alternatives that have their respective strengths and weaknesses so that they are not well targeted to provide the best value for analysis.This system is a Decision Support System (SPK) which was built using the Brown Gibson method and designed using Microsoft Visual Studio 2008 and using a Microsoft Access database. For data processing will be carried out by a selection team or board of judges from the Office of Environment of North Sumatra Province by entering the Kalpataru recipient value data, the system will perform calculations according to the principle of the Brown Gibson method which ultimately results in a ranking that can help the selection team in comparing ranking obtained. The system created has been able to determine who is entitled to be the recipient of the Kalpataru award as expected.
Sistem Pakar Diagnosa Penyakit Pada Tanaman Seledri Menggunakan Metode ANFIS
Triana, Neni
TIN: Terapan Informatika Nusantara Vol 1 No 8 (2020): Januari 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Expert systems are computer-based information systems that use expert knowledge to achieve high-level decision performance in a narrow problem domain. MYCIN, developed at Stanford University in the early 1980's for medical diagnosis, is generally considered the most well-known expert system. Celery (Apium Graveolens L) is a leaf vegetable and medicinal plant commonly used as a cooking spice. Celery is a versatile plant, especially as a vegetable and medicine and is also used as a salad. plant disease is one of the factors that can cause crop production failure. Celery disease can attack all stages of celery development, from seed production to plant production. In this study the authors used the ANFIS method. ANFIS is an integrated fuzzy system interface mechanism that is described in a neural network architecture. The fuzzy inference system used is the first order Tagaki-Sugeno-Kang (TSK) inference system with considerations of simplicity and ease of computation. ANFIS is an adaptive system based on fuzzy logic inference that combines two methods, namely adaptive (neural method) and fuzzy method. This adaptive network is used to adapt the fuzzy logic inference system to represent the desired fuzzy interference system. The principle of the working method is to combine two methods, namely the adaptive method and the fuzzy method in which both use the same two information sources, but have different representations.
Perancangan Website Dengan Usability Pada Toko Cek Hijab Baturaja Kabupaten Ogan Komering Ulu
Faulina, Sri Tita;
Wisnumurti, Wisnumurti
TIN: Terapan Informatika Nusantara Vol 1 No 8 (2020): Januari 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Computer technology today is a means of communication that brings a lot of change to the world of education, business, government agencies, and private sector. One form of technological development that is currently trending is website. Website is one of the applications on the internet in the form of Hypertext information, where Hypertext can read and browse the information virtually without being related to certain media. With the website is expected to help market products or services, promote a company, and others online. This website application helps users, in this case business owners both goods and services and internet connoisseurs in this case are consumers which with the existence of the website will cause a sense of comfort and provide convenience to the komsumen to be able to choose the goods according to the wishes. With an attractive look, and easy to understand website is expected to help business owners in increasing sales. Based on this thought, a website is created using the Usability method with the results in the form of an attractive website appearance for consumers.
Analisa Pola Gadai BPKB Kendaraan dengan Menerapkan Algoritma FG-Growth
Ningsih, Fitri Pratiwi
TIN: Terapan Informatika Nusantara Vol 1 No 9 (2021): Februari 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Data Mining is a series of processes to explore added value in the form of information that has been known manually from a database by extracting patterns from data with the aim of manipulating data into more valuable information obtained by extracting and recognizing patterns important or interesting from the data contained in the database. The data mining technique has various algorithms and techniques for solving problems related to data, one of which is the FP-Growth algorithm and the technique of association rules. Information displayed using association rules technique, which displays the value of support and confidence from each data mining process. With the FP-Growth algorithm, it is evident from the results of the tests carried out, the FP Growth algorithm and association rules technique run as expected and can be implemented in this Data Mining.
Segmentasi Citra Spektrum Menggunakan Algoritma Region Growing
Marbun, Riccy Erwandy
TIN: Terapan Informatika Nusantara Vol 1 No 9 (2021): Februari 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Image segmentation is a process shown to get the objects contained in the image or to divide the image into several areas with each object or area having similar attributes. The Region growing algorithm is a procedure that groups pixels or sub-regions into larger areas based on defined criteria. The basic approach starts from the set of starting points, then the area is enlarged by adding each neighboring pixel point that has similar properties to that point, for example the range specification intensity or color. The purpose of region-based segmentation (region) is to divide an image into several regions, this is done by grouping parts of the image that have the same characteristics in the form of color changes between adjacent points. The application of the Region Growing algorithm can be used in analyzing the segmentation of Infrared Spectrum Image in detecting image edges based on the growth area with the image segmentation process using the Region Growing algorithm
Implementasi Algoritma Skipjack Dalam Pengamanan File Video
Gaol, Rina Wanty Lumban
TIN: Terapan Informatika Nusantara Vol 1 No 9 (2021): Februari 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The problem that lies within the scope of the video is where the privacy video can be watched by unauthorized people if the video file is unsecured. In the event of a burglary and theft of important data information in a video file, it will be detrimental to interested parties. Therefore, we need an application system to be able to secure the video file. To minimize this, a second level of security is needed by scrambling the video so that the visual information from the video cannot be seen by people who do not have a key. Then the information in the video file is changed in the form of codes or signals where this code will be manipulated. Thus the authors feel the video files need to be secured with good security. So it is necessary to make encryption and decryption on video files. The skipjack algorithm is one of the cryptographic algorithms that can be used to secure video files. The skipjack algorithm is a 64-bit codebook electronic algorithm that changes a 64-bit input block to a 64-bit output block. The parameters used for encryption are 80-bit keys, and have 32 rounds for the encryption and description process. This study describes how to secure video files based on the skipjack algorithm.
Implementasi Algoritma FP-Growth Pada Pengenalan Pola Penjualan
Nurasiah, Nurasiah
TIN: Terapan Informatika Nusantara Vol 1 No 9 (2021): Februari 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Data Mining is a series of processes to extract additional value in the form of information that has been known manually from a database by extracting patterns from data with the aim of manipulating data into more valuable information obtained by extracting and extracting patterns important or pull the data contained in the database. Data Mining technique has various kinds of algorithms and techniques for solving problems related to data, one of which is the FP-Growth algorithm and the association rule technique. The information displayed using the association rule technique, which displays the value of support and confidence from each data mining process. With the FP-Growth algorithm, it is proven from the results of the tests carried out, the FP-Growth algorithm and the association rule technique run as expected and can be implemented in this Data Mining