cover
Contact Name
Akim Manaor Hara Pardede
Contact Email
jaiea@ioinformatic.org
Phone
+6281370747777
Journal Mail Official
jaiea@ioinformatic.org
Editorial Address
Jl. Gunung Sinabung Perum. Grand Marcapada Indah. Blok. F1. Kota Binjai. Sumatera Utara
Location
Unknown,
Unknown
INDONESIA
Journal of Artificial Intelligence and Engineering Applications (JAIEA)
Published by Yayasan Kita Menulis
ISSN : -     EISSN : 28084519     DOI : https://doi.org/10.53842/jaiea.v1i1
The Journal of Artificial Intelligence and Engineering Applications (JAIEA) is a peer-reviewed journal. The JAIEA welcomes papers on broad aspects of Artificial Intelligence and Engineering which is an always hot topic to study, but not limited to, cognition and AI applications, engineering applications, mechatronic engineering, medical engineering, chemical engineering, civil engineering, industrial engineering, energy engineering, manufacturing engineering, mechanical engineering, applied sciences, AI and Human Sciences, AI and education, AI and robotics, automated reasoning and inference, case-based reasoning, computer vision, constraint processing, heuristic search, machine learning, multi-agent systems, and natural language processing. Publications in this journal produce reports that can solve problems based on intelligence, which can be proven to be more effective.
Articles 9 Documents
Search results for , issue "Vol. 2 No. 3 (2023): June 2023" : 9 Documents clear
The Expert System Determines Children's Emotions with Learning Achievement Using The Web-based Damster Shafer Method Nasution, Cellina Roanda
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.167

Abstract

Psychology studies human behavior and mental processes is possible there involved the use of technology, but the use and utilization of technology in the field of psychology is felt still lacking. One method that is still widely used in psychology that is by making the Demster Shafer sheet. Demster Shafer method can be modified in the form of computer applications, where the application is using the knowledge of experts of psychology entered into the computer called expert systems applications. Application of expert system is designed to determine the child's learning style at primary school age. Application of expert systems is expected to overcome the problems of determining the child's learning style. In addition, it can be used as a support in the field of psychology and can be used for public purposes and individuals in general.
Recruitment of STMIK Kaputama Laboratory Assistant with the Waspas method Wulandari, Sri
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.195

Abstract

Decision Support System (DSS) is one of the approaches that can be used in the selection process for accepting laboratory assistants in a tertiary institution. DSS is often used to assist various decision-making processes within an organization. Through the various stages contained in the DSS, it is able to produce the output in the form of the best alternative from the various criteria that have been determined by the decision maker. There are various methods that can be used in relation to DSS, one of which is the Weighted Aggregated Sum Product Assessment (WASPAS). The Decision Support System can speed up the recruitment of new Laboratory assistants according to predetermined criteria when recruiting prospective Laboratory assistants at STMIK Kaputama. The STMIK Kaputama Laboratory is a computer laboratory that is used to support practicum courses at STMIK Kaputama. Each course has at least one assistant. The requirements for prospective laboratory assistants are that they must register and meet the criteria as potential assistants. The results of this study indicate that the proposed model can be used properly in carrying out the selection process for laboratory assistant recruitment. the WASPAS method is able to produce decisions in the form of the best alternative that can be used to assist decision-making parties. so that it can determine who is eligible to be accepted as a computer laboratory assistant at STMIK Kaputama.
Design and Development of a Realtime Human Heart Rate Measurement System Using IOT-Based Pulse Sensors Surja Arafat; Pardede, A M H
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.199

Abstract

The heart is one of the important organs that humans have, whose function is to pump blood throughout the body and accommodate it again after cleaning the lungs. Heart rate beats per minute (bpm) is a parameter to show the condition of the heart, and the way to find out the condition of the heart is to know the frequency of the heart rate. This heart rate monitoring tool is designed based on the NodeMCU ESP8266 and a pulse sensor to detect heart rate. This study aims to make it easier to know the heart rate frequency in realtime. A heart rate monitoring tool based on NodeMCU ESP8266 has been designed with a pulse sensor to detect heart rate. Heart rate data from monitoring results will then be sent via a wifi network connection and displayed on the Smartphone.
Hybrid Cryptosystem Algorithm Vigenere Cipher and Base64 for Text Message Security Utilizing Least Significant Bit (LSB) Steganography as Insert into Image Nasution, Raja Imanda Hakim; Achmad Fauzi; Husnul Khair
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.201

Abstract

Security message text is aspect important in modern communications for guard privacy and confidentiality information. Without exists guarantee security, of course just can raises risk when sensitive and valuable information are accessed by unauthorized persons responsible answer. Cryptography and steganography is two field used in a manner wide For reach objective this. Algorithm Vigenere Cipher and Base64 are method used for encryption message text and Least Significant Bit (LSB) steganography was used as method for insert message encrypted to in image. LSB makes use of the last bits from pixels image for keep information addition without bother image visual display in a manner significant. With utilise method here, order encrypted can hidden in a manner confidential in image that looks normal. This hybrid cryptosystem combine excess from third algorithm such, ie speed and effectiveness encryption use algorithm Vigenere Cipher as well ability Base64 characteristics, and levels security message more increase.
Temperature Measurement System Using Arduino Yusfrizal, Yusfrizal; Mutiara Sovina; Harahap, Faisal Amir; Ivi Lazuly
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.203

Abstract

Living things need the right temperature to meet their life needs. It is necessary to do the measurement process. One process formeasuring room temperature that is widely used at this time is the automatic temperature measurement and air conditioning system. The temperature measurement system and air conditioning automation is a system that is very useful for human life. With this system is expected to make it easier to know the room temperature. LM35 is a sensor used in this study as a sensor that is very sensitive to temperature. The sensor results are processed by Arduino Uno which is then displayed in a desktop application using C# .Net and stored in the database. The room temperature measurement system, especially the one made in this project, can measure room temperature with an unstored data tolerance value ± 4 times in one minute. When the temperature exceeds the set temperature, the fan will rotate automatically as an air conditioner. This system works every second and displays the results on the desktop application and stores them in the database as the final storage place which can be developed or made a decision in the future.
Implementation Of Affine Cipher Combination And Merkle Hellman On The Process Digital Image Security Muhammad Fadillah Azmi; Achmad Fauzi; Husnul Khair
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.204

Abstract

The use of image media information has several weaknesses, one of which is the ease with which it can be manipulated by irresponsible people. Efforts made in increasing the security of this image is cryptography, namely the science and art of maintaining the security and confidentiality of images. Cryptography is used so that the confidentiality of the image can be maintained, so that it is not known by others. In general, there are 2 (two) techniques for carrying out cryptographic processes, namely encryption and decryption. In this study, the encryption process was first carried out using the Affine Cipher algorithm and then continued with the Merkle Hellman algorithm, while the decryption was carried out first by Merkle Hellman and then decrypted again with the Affine Cipher. The results of this study indicate that applying the Affine Cipher and Merkle Hellman algorithms can secure images. At the end of this system is an image that is in the form of blur so that it is not known and not understood by others. That way people who are not entitled cannot understand from the image.
Distribution Of Lightweight File Delivery Using IoT Tanjung, Anggi Muhammad; Pardede, A M H
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.210

Abstract

A lightweight file lifter car distribution device using Iot has been designed. This robot system uses the NodeMCU ESP8266 microcontroller where the NodeMCU ESP8266 functions as a data processor, and also a WI-FI network receiver emitted by a WI-FI network system. This robot car system uses a control system using an Android smartphone to control the movement of the wheels, this robot car uses a WI-FI network communication system so that the robot car system and Android smartphone can be connected, in this robot car system it uses a DC motor rotation direction drive driver which is The driver functions to move the direction of rotation of the DC motor on the wheels of the robot car. The power supply for this robot uses 3 3.7 Volt Li-Ion batteries which are arranged in series to get a 12 volt voltage, the 12 volt battery voltage goes first to the 7805 regulator IC circuit to get an output voltage of 5 volts, 5 volts voltage. this is what functions to supply the robot system so that it can be operated
Superencryption of BASE 64 Algorithm and ELGAMAL Algorithm on Android Based Image Security Usman Gumanti; A M H Pardede; Husnul Khair
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.211

Abstract

In the current era of globalization, the development of information technology is growing rapidly, there is a possibility that there will be data leaks when the process of exchanging information is carried out, then security becomes a very important aspect which will cause unwanted things, for example manipulation of images in the form of information systems. If this important information falls into the hands of the wrong person, it can be negative and can be detrimental to the image owner. So a security system is designed that functions to protect the data that is sent while maintaining its authenticity and authenticity. Various ways have been developed for data security, one of which is by using cryptography. Cryptography is the science of securing data by using data transformation so that the resulting data cannot be understood by other parties. This transformation can provide a solution to two data security problems, namely the problem of privacy and data authentication. Cryptographic techniques can be used to ensure data security, one of which can be utilized is encryption and description of data or in other words encoding data so that only the person concerned can understand the contents of the data. The proper use of information technology is very important to send private and confidential images to certain parties. These images are still in the form of PNG and JPG extensions, for this reason a security system is needed that can protect images that are transmitted through a communication network, one way that can be done to secure images is using the BASE 64 algorithm and the ELGAMAL algorithm.
A Combination Of A Rail Fence Cipher And Merkle Hellman Algorithm For Digital Image Security Irwansyah; Achmad Fauzi; Siswan Syahputra
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.212

Abstract

Image is a combination of planes, points, lines and colors to create a physical or human object. Images can be in the form of 2-dimensional images, such as photographs and paintings. 3-dimensional image like a statue. The use of image media information has several weaknesses, one of which is the ease with which it can be manipulated by certain parties with the help of increasingly developing technology. In this study, the Rail Fence Cipher and Merkle Hellman methods were applied which aimed to obtain a stronger cipher by utilizing two key levels where an asymmetric algorithm was used to protect the symmetric key. The asymmetric algorithm used is Merkle Hellman and the symmetrical algorithm used is Rail Fence Cipher. The results of this study indicate that applying the Rail Fence Cipher and Merkle Hellman algorithms can secure image files and secure keys for data integrity. Encryption and description processing time is affected by the size and resolution of the image file.

Page 1 of 1 | Total Record : 9