cover
Contact Name
Akim Manaor Hara Pardede
Contact Email
jaiea@ioinformatic.org
Phone
+6281370747777
Journal Mail Official
jaiea@ioinformatic.org
Editorial Address
Jl. Gunung Sinabung Perum. Grand Marcapada Indah. Blok. F1. Kota Binjai. Sumatera Utara
Location
Unknown,
Unknown
INDONESIA
Journal of Artificial Intelligence and Engineering Applications (JAIEA)
Published by Yayasan Kita Menulis
ISSN : -     EISSN : 28084519     DOI : https://doi.org/10.53842/jaiea.v1i1
The Journal of Artificial Intelligence and Engineering Applications (JAIEA) is a peer-reviewed journal. The JAIEA welcomes papers on broad aspects of Artificial Intelligence and Engineering which is an always hot topic to study, but not limited to, cognition and AI applications, engineering applications, mechatronic engineering, medical engineering, chemical engineering, civil engineering, industrial engineering, energy engineering, manufacturing engineering, mechanical engineering, applied sciences, AI and Human Sciences, AI and education, AI and robotics, automated reasoning and inference, case-based reasoning, computer vision, constraint processing, heuristic search, machine learning, multi-agent systems, and natural language processing. Publications in this journal produce reports that can solve problems based on intelligence, which can be proven to be more effective.
Articles 430 Documents
Design and Build Running Text Controls Using IoT Aji Tyo Syahputra; Fauzi, Achmad; Milli Alfhi Syari
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.625

Abstract

This research designs and builds an Internet of Things (IoT)-based running text control system using the P10 display module which can be controlled through the Blynk application and displays the temperature in real-time using the DHT22 sensor. The system consists of hardware such as a microcontroller, Wi-Fi module, P10 LED display, and DHT22 sensor to measure temperature and humidity. The Blynk app is used as a user interface to control the messages displayed on the P10 module and monitor the temperature data in real-time. Software development is carried out to integrate the hardware with the Blynk application and enable efficient data transmission. The test results show that this system is able to accurately display text messages and temperature data with low latency. These systems can be applied in a variety of scenarios such as public information systems, environmental surveillance, and dynamic advertising applications.
Application of Apriori to Determine Correlations between Source Competencies Human Resources with Education and Working Period Reza Alexandra; Buaton, Relita; Suria Alamsyah Putra
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.626

Abstract

Human resource competence (HR) is a key factor in supporting organizational performance. Referring to several problems in the Binjai City BKD, such as there is a difference between the competencies possessed by employees and the competencies needed to carry out their duties and responsibilities effectively, the placement of employees that are not in accordance with the competencies, the absence of a system to map and monitor employee competencies can cause difficulties in identifying development needs, as well as in the placement of appropriate employees. Employee competency mapping is relevant in the implementation of human resource management, both in planning, development and employee placement activities. Therefore, it is necessary to carry out competency mapping that can be used for various human resource management needs and this is in accordance with the priority program that will be carried out in the 2025 RKPD, namely improving the quality of innovative human resources. This study uses a priori algorithm with the Rapidminer application to be able to provide correlation results of human resource competencies. From the results of the research, a correlation was formed between human resource competence and education and work period, namely 8 association rules and the highest best rule was obtained with support of 32% and confidence value of 99.4%.
Implementation of K-Nearest Neigbors for Prediction of Motorcycle Service Waiting Times in Develop Tech Huandito, Dion Tri; Sri Lestanti; Filda Febrinita
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.627

Abstract

This research examines the application of the K-Nearest Neighbors (KNN) algorithm to predict wait times at Develop Tech, a workshop that offers affordable services but has longer spare parts wait times compared to official workshops. The research method used is descriptive quantitative, involving data collection and processing. In this study, the KNN algorithm is utilized to predict wait times by measuring distances between data points using and performing voting based on the K value to determine the final prediction. Testing on 100 data points demonstrated that KNN could predict wait times very accurately, achieving 100% accuracy, precision, and recall at certain K values. The data was split into 80% for training and 20% for testing, a method commonly used in machine learning research to ensure a balance between training data and validation. The results indicate that the KNN algorithm is reliable for predicting wait times with optimal performance at K values between 3 and 10. These findings support the conclusion that the KNN algorithm functions effectively in predicting wait times at the workshop.
Classification of Factors Causing the Decline in Student Learning Achievement in The Post-Pandemic Period Using the C4.5 Algorithm (Case Study: STMIK Kaputama) Rangkuti, Nazwa Nurul Hafizah; Pardede, A M H; Pasaribu, Tioria
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.630

Abstract

The COVID-19 pandemic that has hit Indonesia since 2020 has brought significant changes to various aspects of life, including the learning system in universities. Universities, which originally implemented face-to-face learning processes, were forced to adapt to online learning. However, this change causes various obstacles, especially for students who experience learning loss, namely a decrease in interest and motivation to learn which has an impact on academic achievement. This research aims to classify the factors that cause the decline in student learning achievement in the post-pandemic period at STMIK Kaputama using the C4.5 algorithm. Using data from STMIK Kaputama students as a sample, this research analyzes various factors such as access to technology, involvement in online learning, participation in face-to-face learning, social support, learning motivation, economic conditions, family, college, and academic stress levels. It is hoped that the results of this research will provide a deeper understanding of the dominant factors that cause a decline in learning achievement, as well as become a reference for educational institutions in developing strategies to overcome the negative impacts of online learning during the pandemic Keywords: C4.5 Algorithm, Decrease in Achievement, Data Classification
Design of an Automatic Trash Can Wheel Robot with Bluetooth Navigation Control Through Smartphone Application Irfan Yusuf; Yani Maulita; Saragih, Rusmin
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.631

Abstract

Environmental cleanliness is an important aspect that must be maintained, especially in this modern era. The use of appropriate technology can help increase awareness of cleanliness, one of which is by developing automatic trash cans. This research designs and builds a mobile robot in the form of an automatic trash can that can be controlled via an Arduino Uno microcontroller using Bluetooth and controlled via a smartphone application. This research designs a mobile robot in the form of an automatic trash can that can be controlled via an Arduino Uno microcontroller with Bluetooth and a smartphone application. The system receives navigation commands from the app and uses ultrasonic sensors to detect objects in front of the trash can. The microcontroller processes the command and sensor data to drive the DC motor and servo motor. The servo motor opens and closes the trash can lid automatically when an object is detected at a certain distance. The test results show that this robot can move according to instructions from a smartphone and successfully open and close the trash can lid automatically when detecting objects.
Application of the Apriori Algorithm to Analyze the Correlation of Underage Marriage Factors Rizki Tri Ipanda; A M H Pardede; Melda Pita Uli Sitompul
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.632

Abstract

This study aims to analyze the correlation between various factors contributing to underage marriage in Kota Binjai. The primary variables influencing underage marriage include economic, social, cultural, parental, and educational factors. These five variables are considered significant in the prevalence of underage marriage within the Kota Binjai community. The methodology employed involves data mining techniques using the Apriori algorithm to identify the most frequently occurring data correlations. The analysis reveals that the best rule with 2 itemsets has a support of 42.7% and a confidence of 69.6%, while the best rule with 3 itemsets has a support of 26.7% and a confidence of 71.4%. For 4 itemsets, the support is 12% with a confidence of 50%. These findings indicate that economic factors are the most frequently appearing and consistently influential in the decision of Kota Binjai residents to engage in underage marriage, both independently and in combination with social, cultural, and parental influence factors
Design and Build Automatic Fan Control Based Internet of Things Septian, Refli; Achmad Fauzi; Milli Alfhi Syari
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.634

Abstract

This research aims to create and develop an automatic fan control system based on the Internet of Things (IoT) that can regulate the room temperature well. The NodeMCU ESP8266 serve as a microcontroller for this system. The DHT22 sensor detects temperature, the L298N Driver Motor controls the speed of the 12V DC fan, and the 16x2 LCD displays temperature information in realtime. When the room temperature exceeds the threshold, the fan will automatically turn on and off when the temperature returns to normal. The Blynk app also allows users to monitor and control fans through smartphones. It allows users to manually control the fan and monitor it remotely. The results of the study show that this system works well and improves user comfort by managing the room temperature. The system also offers high flexibility with IoT integration, allowing for further development for wider applications in home automation and energy management.
Design of a Safe Security System Based on Internet of Things Using Face and Fingerprint Detection Pitaloka, Nadila; Pardede, A M H; Husnul Khair
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.636

Abstract

Traditional safe security systems usually use manual keys and a combination of numbers or passwords to open the safe. This system has several disadvantages such as being easy to break into, cumbersome, and the owner easily loses the key, even forgets the password needed to open the safe, which causes the safe to be unable to open. This research develops an Internet of Things (IoT)-based safe security system that uses two security options to open the safe, namely face detection and fingerprint authentication to increase security against unauthorized access with a prototype method. The system uses the ESP32-CAM to capture facial images and send them to the Telegram app for manual verification by the owner, while the fingerprint sensor ensures only registered users can open the safe. Arduino Uno serves as the main microcontroller to manage the integration between components such as ESP32-CAM, fingerprint sensor, relay, solenoid lock, LCD, and buzzer. The test results show that this system is effective in providing security to the safe through notifications, although it still relies on manual verification of faces via Telegram and requires a stable internet connection, and fingerprints that have been registered are successfully implemented. Further development is recommended to automate face recognition and improve the overall performance of the system.
Enhancing AES Key Generation Using Diffie-Hellman Method for Image Security Sinambela, Rifdahtul Ghinaa; Achmad Fauzi; Husnul Khair
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.637

Abstract

The increasing need for secure image transmission has led to the development of cryptographic techniques that combine encryption algorithms and secure key exchange methods. This paper proposes a system for enhancing the security of digital images by using the Advanced Encryption Standard (AES) combined with the Diffie-Hellman method for key generation. AES is applied for encryption and decryption, while Diffie-Hellman ensures the secure exchange and generation of secret keys. The system, developed in Microsoft Visual Basic .NET 2010, was tested on various image formats and demonstrated effective protection against brute force attacks. This approach ensures secure digital image transmission and confidentiality.
Implementation of the Prototype Method in Design E-Commerce New World Distro Store Ibrahim Saleh; Ariansyah; Andi Christian
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v4i1.638

Abstract

Distro is a place to sell clothes that is currently favored by many people. Both children and adults. This distribution itself has various types of clothing for children and adults. New World distribution provides various types of clothing such as shirts, pants, jackets, hoodies, and others. The transaction process on distros is still done manually by coming directly to the store, for that it would be better if the distro had a website as a place to sell and promote. Researchers will use the Prototype method as a development method that will be used when designing and building applications, while the research method that will be used is a descriptive method through a qualitative approach. Researchers collected data through direct observation, interviews and literature study. The design tools in this study will use the Unified Modeling Language (UML), namely, use case diagrams, class diagrams, and activity diagrams.