cover
Contact Name
Muhammad Khoiruddin Harahap
Contact Email
choir.harahap@yahoo.com
Phone
+6282251583783
Journal Mail Official
publikasi@itscience.org
Editorial Address
Medan
Location
Unknown,
Unknown
INDONESIA
Brilliance: Research of Artificial Intelligence
ISSN : -     EISSN : 28079035     DOI : https://doi.org/10.47709
Core Subject : Science, Education,
Brilliance: Research of Artificial Intelligence is The Scientific Journal. Brilliance is published twice in one year, namely in February, May and November. Brilliance aims to promote research in the field of Informatics Engineering which focuses on publishing quality papers about the latest information about Artificial Intelligence. Submitted papers will be reviewed by the Journal and Association technical committee. All articles submitted must be original reports, previously published research results, experimental or theoretical, and colleagues will review. Articles sent to the Brilliance may not be published elsewhere. The manuscript must follow the author guidelines provided by Brilliance and must be reviewed and edited. Brilliance is published by Information Technology and Science (ITScience), a Research Institute in Medan, North Sumatra, Indonesia.
Articles 544 Documents
Application of Dempster-Shafer Theory Method in Expert System for Diagnosis of Psychological Disorders in Children Azhari, M. Faishal; Putri, Raissa Amanda
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3764

Abstract

The development of technology at this time has changed very rapidly in recent decades. Expert system is one of the sub-sections of artificial intelligence that aims to process and display the results of the conclusion of the previous process based on the knowledge that has been obtained. The purpose of this research is to apply the Dempster-Shafer method to the expert system for diagnosing psychological disorders in children and to design and build an expert system using the Dempster-Shafer method on a website-based expert system for diagnosing psychological disorders in children. Based on the results and discussion in this study, it can be concluded that the Dempster Shafer Method can be applied properly in an expert system for diagnosing psychological disorders in children. The Dempster Shafer method in this system gets results that are accurate enough so that it can generate a diagnosis based on symptoms accompanied by a handling solution. This expert system application for diagnosing psychological disorders in children can diagnose and determine the diagnosis results from consultations conducted by users using the Dempster Shafer method. Where in the example case, the percentage result is around 87.15%. This system can also help parents to get information about children's psychological disorders, symptoms, and solutions that can be applied.
Teaching Product Design Through The CANVA Application To Enhance The Brand Image Of The Company Orisa, Mira; Faisol, Ahmad; Ashari, Muhammad Ibrahin
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3775

Abstract

The study aims to investigate the effectiveness of using Canva applications to improve employees' graphic design skills. The research was conducted by observing a company that operates in the areas of Maintenance service, General supply and renovation. This research activity is designed into several stages such as the partner observation phase, the preparatory stage of training, the training stage, and the final stage of evaluation. Based on observations stated that the company has employees from various disciplines such as electro, civil, electric energy. We provide training to employees in graphic design. For us this knowledge is also very important to the employees to help companies improve their brand image. In the business world, one of the most crucial marketing tools for presenting and promoting a product to potential customer is an engaging and educational product design presentation. The purpose of this study is to determine how simple it is to create brand image successful like a poster, flyers, logo, and brochure using Canva's graphic design platform. Users can easily design and edit with Canva's array of design tools, which include text tools, color adjustment tools, image manipulation tools, grid tools, and more. They can design their brand image easily using online applications like canva. canva provides easy access anywhere and anytime because it is internet-based.
Comparative Analysis Of Machine Learning Models For Greenhouse Microclimate Prediction Cletus, Felicia; John, Anagu Emmanuel
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3783

Abstract

The research assesses the effectiveness of these models as Bi-LSTM, ANN, GBM, and RF in predicting microclimate factors like temperature, humidity, and CO2 levels. It also highlights the constraints associated with employing machine learning models for greenhouse microclimate prediction and suggests potential areas for future investigation. The findings indicate that both ensemble techniques (Gradient Boosting Machine and Random Forest) and deep learning frameworks (ANN and BI-LSTM) performed well during the assessment. While both ensemble methods exhibited impressive results, Gradient Boosting Machine (GBM) slightly surpassed Random Forest (RF) across various evaluation criteria. GBM attained a notable R-squared value of 0.9998, signifying its robust fit and capacity to elucidate data variability, in addition to a Root Mean Squared Error (RMSE) of 0.0079 and Mean Absolute Error (MAE) of 0.0001. RF demonstrated similar outcomes, with an R-squared value of 0.9999. Conversely, ANN outperformed BI-LSTM in terms of R-squared values and MAE, displaying an R-squared value of 0.999999 and a MAE of 0.0079. An analysis of the sensitivity of the ANN model revealed that altering the average indoor relative humidity in the first sensor had the greatest impact on the prediction outcome among other variables. Assessing and ranking the importance of each feature used in training the RF and GBM models indicated that the average relative humidity in the second sensor held the highest significance, with any modification to it likely to notably influence the prediction outcome. These results support the notion that machine learning algorithms serve as effective predictive tools, offering valuable insights for enhancing greenhouse operations. Future research should focus on practical implications and real-world applications, particularly in optimizing hyperparameters.
Digital Forensic Analysis Of APK Files In Phishing Scams On Whatsapp Using The NIST Method sudjayanti, shafa alya; Hamdani, Dani
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3800

Abstract

Cybercrime targeting Android devices through phishing methods, especially through the WhatsApp messaging app, has emerged as a critical issue in cybersecurity. It requires comprehensive investigation and analysis. This research attempts to address this critical issue by conducting a comprehensive digital forensic investigation using the National Institute of Standards and Technology (NIST) framework methodology. Using advanced reverse engineering techniques and Vscode's APKTool extension tool, called APKLab, the research carefully examines the structure and mechanism of hidden encoded APK files that aim to steal sensitive information, such as SMS messages containing one-time passwords (OTPs), and send them via the Telegram app to attackers who can use them to access personal and banking data. As a result, this research provides a deeper understanding of the cybersecurity threats to Android devices and suggestions for mitigation measures for users and organizations. The recommendations are consistent with NIST principles. They emphasize the importance of user education, application source code reviews, system updates, and considering the use of additional security software. By filling an important gap in digital forensics, this research aims to provide insight into preventing and mitigating phishing scams via APK files on WhatsApp Android. It also highlights the importance of strong cybersecurity measures and encourages continued research efforts to effectively counter emerging cyber threats.
Fiber to the home (FTTH) activation system and analysis of dropcore cable connection losses on optical network performance Asril, Aprinal Adila; Maria, Popy; Yustini, Yustini; setiawan, Herry; Nasrul, Nasrul
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3815

Abstract

The FTTH network is currently a reliable network concept used in an era where very fast access to information is needed as it is today, but several problems arise in the FTTH network, for example, reduced data transmission speed due to losses in the transmission cable connection or drop core. In this study, activation of the FTTH network will be carried out so that it can function for internet data transmission and observations will also be made of the connection losses on the 10-meter dropcore cable with the number of connections respectively, namely no connection, 1 connection, and 2 connections, where each connection obtains connection losses from 0.00 to 0.02 dB which will affect the total attenuation obtained in the activated FTTH network. Standard attenuation for fiber optic network activation starting from OLT to ONT according to IEEE Std 802.3ah states that the permissible attenuation / loss tolerance is between 20-24 to 29 dB. Splicing losses are caused by errors in the process of joining the fiber optic cable cores. The number of connections in a fiber optic cable can affect the attenuation value in the fiber optic cable. The more connections, the higher the attenuation in the fiber optic cable.
Design of a Web-Based Lecturer Attendance Information System Using QR Codes at Muhammadiyah University of Jambi Ikhsan, Muhammad; Helmina, Helmina
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3838

Abstract

Information technology in the world today is developing very rapidly. This development has resulted in an information and communication system that has given birth to new innovations, one of which is online attendance using QR Code. Currently, lecturers' attendance control in teaching courses is still done manually, that is, lecturers sign absences according to the lecture schedule and courses given at the academy. Where there is a problem in this case, namely that they often forget to sign the lecturer's absence which has an impact on the lecturer's teaching honorarium. Because teaching honorarium is calculated based on the absence of control. Therefore, it is hoped that the implementation of web-based attendance using QR Code will make it easier for lecturers to take absences and help academics in recording lecturers' controlled absences which will be handed over to the finance department, thereby reducing the occurrence of errors in paying lecturers' teaching honorariums. The data collection method in this research is observation, interviews, documentation and questionnaires. System design uses DFD (Data Flow Diagram), as well as system design using HTML and PHP, while for databases using MySQL.
Design and build multiple input multiple output (MIMO) wideband element microstrip antennas for WiFi access-point applications Maria, Popy; Asril, Aprinal Adila; Nasrul, Nasrul; Nita, Sri; Yuhanef, Afrizal
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3839

Abstract

Technology in the telecommunications sector continues to develop. One of them is the Multiple Input Multiple Output (MIMO) antenna used in WIFI access oint application using MIMO technique in enhancement the need to transfer large amounts of data. In the design and manufacture of MIMO antennas for WIFI access applications point with dimensions of 110 mm x 112 mm using FR-4 substrate specifications with a thickness of 1.6 mm. The antenna consists of four ports and is at each corner The groundplane has four slots to achieve good isolation and produces good bandwidth. The antenna simulation produces a bandwidth of 1.0516 GHz with frequency 2.4 GHz, return loss -12.78 dB, isolation -16.08 dB, and VSWR 1.53 dB. Meanwhile, manufactured antennas produce a bandwidth of more than 100 MHz with frequency 2.4 GHz, return loss -13.5 dB, isolation -18.8 dB, and VSWR 1.29 dB. Antenna simulation using the CST Studio Suite 2019 software application. In the application of the antenna used for Wi-Fi as a transmitter By comparing distances, different results are obtained where the power value is Each distance is different because the farther the distance, the greater the power value produced or emitted will be smaller or less optimal  network.
Implementation of Kanban Method in Transactional System Design in the “Mr. Sneakers” Shoe Laundry Business Puspitarani, Yan; Violina, Sriyani; Rumaisa, Fitrah; Sulianta, Feri
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3859

Abstract

Laundry information system design using Kanban method is a strategic step to improve operational efficiency and responsiveness to customer needs in the laundry business. The study aims to design an information system that is integrated with the Kanban method to optimize the transaction process from receiving orders to returning to customers. The study outlines the process of designing a laundry information system using Kanban principles, including workflow mapping, suitable Kanban board design and integration with existing information systems. The results of this information system design show that the application of Kanban can provide a clear visualization of the workflow in the process, improve operational efficiency by speeding up the order cycle time, reducing waiting times, and minimizing errors in the transactions process. Good integration between the information system and the Kanban board allows managers to monitor order status in real time and respond quickly to changing customer requests. In conclusion, designing a laundry information system using the Kanban method can improve business performance, strengthen customer relationships, and create significant added value.
Analysis of Factors Affecting the Use of ChatGPT at Mikroskil University: A Study Based on the Extended UTAUT2 Model Sinaga, Joy Nasten; Panjaitan, Erwin Setiawan; Nurjanah, Sofinana
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3862

Abstract

This study aims to identify factors that influence students' intention and behavior in using ChatGPT at Mikroskil University. The method used in this study is the Unified Theory of Acceptance and Use of Technology (UTAUT2), with the addition of the curiosity variable. Other variables analyzed included Performance Expectations, Effort Expectations, Social Influence, Facilitating Conditions, Hedonic Motivation, Price Value, and Habit. To collect data, the research team conducted a survey of active students of the Faculty of Informatics at the university. Data analysis was conducted using Structural Equation Modeling (SEM), a method that allows researchers to understand complex relationships between variables. The results showed that several factors had a significant influence on the intention and behavior of using ChatGPT. Hedonic Motivation, Habit, and Curiosity were found to be the main factors driving the intention to use ChatGPT. Facilitating Conditions also contributed to the use of the technology. On the other hand, some variables did not show a significant impact on usage intention. Performance Expectancy, Effort Expectancy, Social Influence, and Price Value fall into this category. These findings suggest that the factors that drive technology use may vary, and highlight the importance of curiosity and personal motivation in the adoption of new technologies in higher education settings.
The Implementation of Gated Recurrent Unit (GRU) for Gold Price Prediction Using Yahoo Finance Data: A Case Study and Analysis Sudiatmika, I Putu Gede Abdi; Putra , I Made Agus Widiana; Artana, Wayan Widya
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3865

Abstract

Gold is a precious metal resistant to corrosion and oxidation, highly valued in investment and trade. Currently, the demand for gold is increasing as it is considered a safe haven. This is evidenced by 48% of respondents out of 2,333 respondents choosing gold as the most preferred investment, based on a survey conducted by Jakpat. However, gold actually has a fluctuating price. The fluctuating price of gold worldwide is influenced by many factors such as economic conditions, inflation rate, supply and demand of gold, and the US dollar exchange rate. Therefore, there is a need for a prediction that can estimate the price of gold based on the movement of gold prices in previous periods. In this study, an evaluation of the performance of GRU for predicting the price of gold will be conducted.. The research methodology includes data collection and processing of gold prices, application of the GRU model, and evaluation of model performance with evaluation metrics such as Mean Squared Error (MSE) and Mean Absolute Error (MAE). Gold price data is taken from Yahoo Finance from December 14, 2017, to March 14, 2024, and processed through normalization and data splitting into training and testing sets. The results of the study show that the GRU model is able to predict gold prices with an adequate level of accuracy. Based on the MSE and MAE values, the combination that provides the best performance is a batch size of 64 with 100 epochs, as it yields the lowest MSE and MAE.