cover
Contact Name
Akim Manaor Hara Pardede
Contact Email
jaiea@ioinformatic.org
Phone
+6281370747777
Journal Mail Official
jaiea@ioinformatic.org
Editorial Address
Jl. Gunung Sinabung Perum. Grand Marcapada Indah. Blok. F1. Kota Binjai. Sumatera Utara
Location
Unknown,
Unknown
INDONESIA
Journal of Artificial Intelligence and Engineering Applications (JAIEA)
Published by Yayasan Kita Menulis
ISSN : -     EISSN : 28084519     DOI : https://doi.org/10.53842/jaiea.v1i1
The Journal of Artificial Intelligence and Engineering Applications (JAIEA) is a peer-reviewed journal. The JAIEA welcomes papers on broad aspects of Artificial Intelligence and Engineering which is an always hot topic to study, but not limited to, cognition and AI applications, engineering applications, mechatronic engineering, medical engineering, chemical engineering, civil engineering, industrial engineering, energy engineering, manufacturing engineering, mechanical engineering, applied sciences, AI and Human Sciences, AI and education, AI and robotics, automated reasoning and inference, case-based reasoning, computer vision, constraint processing, heuristic search, machine learning, multi-agent systems, and natural language processing. Publications in this journal produce reports that can solve problems based on intelligence, which can be proven to be more effective.
Articles 430 Documents
Hybrid Cryptosystem Algorithm Vigenere Cipher and Base64 for Text Message Security Utilizing Least Significant Bit (LSB) Steganography as Insert into Image Nasution, Raja Imanda Hakim; Achmad Fauzi; Husnul Khair
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.201

Abstract

Security message text is aspect important in modern communications for guard privacy and confidentiality information. Without exists guarantee security, of course just can raises risk when sensitive and valuable information are accessed by unauthorized persons responsible answer. Cryptography and steganography is two field used in a manner wide For reach objective this. Algorithm Vigenere Cipher and Base64 are method used for encryption message text and Least Significant Bit (LSB) steganography was used as method for insert message encrypted to in image. LSB makes use of the last bits from pixels image for keep information addition without bother image visual display in a manner significant. With utilise method here, order encrypted can hidden in a manner confidential in image that looks normal. This hybrid cryptosystem combine excess from third algorithm such, ie speed and effectiveness encryption use algorithm Vigenere Cipher as well ability Base64 characteristics, and levels security message more increase.
Temperature Measurement System Using Arduino Yusfrizal, Yusfrizal; Mutiara Sovina; Harahap, Faisal Amir; Ivi Lazuly
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.203

Abstract

Living things need the right temperature to meet their life needs. It is necessary to do the measurement process. One process formeasuring room temperature that is widely used at this time is the automatic temperature measurement and air conditioning system. The temperature measurement system and air conditioning automation is a system that is very useful for human life. With this system is expected to make it easier to know the room temperature. LM35 is a sensor used in this study as a sensor that is very sensitive to temperature. The sensor results are processed by Arduino Uno which is then displayed in a desktop application using C# .Net and stored in the database. The room temperature measurement system, especially the one made in this project, can measure room temperature with an unstored data tolerance value ± 4 times in one minute. When the temperature exceeds the set temperature, the fan will rotate automatically as an air conditioner. This system works every second and displays the results on the desktop application and stores them in the database as the final storage place which can be developed or made a decision in the future.
Implementation Of Affine Cipher Combination And Merkle Hellman On The Process Digital Image Security Muhammad Fadillah Azmi; Achmad Fauzi; Husnul Khair
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.204

Abstract

The use of image media information has several weaknesses, one of which is the ease with which it can be manipulated by irresponsible people. Efforts made in increasing the security of this image is cryptography, namely the science and art of maintaining the security and confidentiality of images. Cryptography is used so that the confidentiality of the image can be maintained, so that it is not known by others. In general, there are 2 (two) techniques for carrying out cryptographic processes, namely encryption and decryption. In this study, the encryption process was first carried out using the Affine Cipher algorithm and then continued with the Merkle Hellman algorithm, while the decryption was carried out first by Merkle Hellman and then decrypted again with the Affine Cipher. The results of this study indicate that applying the Affine Cipher and Merkle Hellman algorithms can secure images. At the end of this system is an image that is in the form of blur so that it is not known and not understood by others. That way people who are not entitled cannot understand from the image.
Distribution Of Lightweight File Delivery Using IoT Tanjung, Anggi Muhammad; Pardede, A M H
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.210

Abstract

A lightweight file lifter car distribution device using Iot has been designed. This robot system uses the NodeMCU ESP8266 microcontroller where the NodeMCU ESP8266 functions as a data processor, and also a WI-FI network receiver emitted by a WI-FI network system. This robot car system uses a control system using an Android smartphone to control the movement of the wheels, this robot car uses a WI-FI network communication system so that the robot car system and Android smartphone can be connected, in this robot car system it uses a DC motor rotation direction drive driver which is The driver functions to move the direction of rotation of the DC motor on the wheels of the robot car. The power supply for this robot uses 3 3.7 Volt Li-Ion batteries which are arranged in series to get a 12 volt voltage, the 12 volt battery voltage goes first to the 7805 regulator IC circuit to get an output voltage of 5 volts, 5 volts voltage. this is what functions to supply the robot system so that it can be operated
Superencryption of BASE 64 Algorithm and ELGAMAL Algorithm on Android Based Image Security Usman Gumanti; A M H Pardede; Husnul Khair
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.211

Abstract

In the current era of globalization, the development of information technology is growing rapidly, there is a possibility that there will be data leaks when the process of exchanging information is carried out, then security becomes a very important aspect which will cause unwanted things, for example manipulation of images in the form of information systems. If this important information falls into the hands of the wrong person, it can be negative and can be detrimental to the image owner. So a security system is designed that functions to protect the data that is sent while maintaining its authenticity and authenticity. Various ways have been developed for data security, one of which is by using cryptography. Cryptography is the science of securing data by using data transformation so that the resulting data cannot be understood by other parties. This transformation can provide a solution to two data security problems, namely the problem of privacy and data authentication. Cryptographic techniques can be used to ensure data security, one of which can be utilized is encryption and description of data or in other words encoding data so that only the person concerned can understand the contents of the data. The proper use of information technology is very important to send private and confidential images to certain parties. These images are still in the form of PNG and JPG extensions, for this reason a security system is needed that can protect images that are transmitted through a communication network, one way that can be done to secure images is using the BASE 64 algorithm and the ELGAMAL algorithm.
A Combination Of A Rail Fence Cipher And Merkle Hellman Algorithm For Digital Image Security Irwansyah; Achmad Fauzi; Siswan Syahputra
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 3 (2023): June 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v2i3.212

Abstract

Image is a combination of planes, points, lines and colors to create a physical or human object. Images can be in the form of 2-dimensional images, such as photographs and paintings. 3-dimensional image like a statue. The use of image media information has several weaknesses, one of which is the ease with which it can be manipulated by certain parties with the help of increasingly developing technology. In this study, the Rail Fence Cipher and Merkle Hellman methods were applied which aimed to obtain a stronger cipher by utilizing two key levels where an asymmetric algorithm was used to protect the symmetric key. The asymmetric algorithm used is Merkle Hellman and the symmetrical algorithm used is Rail Fence Cipher. The results of this study indicate that applying the Rail Fence Cipher and Merkle Hellman algorithms can secure image files and secure keys for data integrity. Encryption and description processing time is affected by the size and resolution of the image file.
Searching For The Nearest Route To The Location Of Health Facilities Using The Djikstra Method Indriana, Nurita; Pardede, A M H; Syahputra, Siswan
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 3 No. 1 (2023): October 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v3i1.224

Abstract

A health facility or health service facility is a tool or place used to carry out health service efforts, both in terms of promotive, preventive, curative and rehabilitative carried out by the central government, regional government or the community. This research contains development applications that cover every hospital, health center, and practice clinic located in the Langkat Regency area with the aim of facilitating the community in finding the nearest hospital, health center, and practice clinic. The application built can display the location of the health facility in map form and can display information in the form of name, address, telephone number, photo of the health facility, services available there, working hours, and further information on the place. In this study, the search for health facilities is only subject to distance as a health facility criterion, so that it can be developed further. To find the closest route to a health facility, here the author uses the Dijkstra Algorithm method which has been widely researched to be applied to the shortest route search system. This algorithm was invented by Edsger Dijkstra, a computer scientist from the Netherlands. The way Dijkstra's algorithm works is with a greedy strategy, namely at each step it chooses the side with the smallest value that connects the selected and unselected nodes/nodes. This algorithm requires a point of origin and a destination with the final result being the shortest distance from the point of origin to the destination along with the route.
Cloud Computing Technology in Development E-Business (Literature Review) Fitri, Liana Syah; Elinca; Larisma, Ena; Natalia; Levina , Britney
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 3 No. 1 (2023): October 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v3i1.232

Abstract

Good use of technology will be able to help various kinds of work activities including in the business world. High mobility requires a person or group to use information technology. One of the topics of technological development today is cloud computing. Cloud computing is a technology that uses the internet network to access resources in the process of managing data, processing data to its application. Cloud computing is widely used by people to start a business because it has many advantages in starting a business. One of the new concepts offered is e-business or electronic business. E-business is an expanded form of e-Commerce, where e-business is accompanied by customer service, collaboration with business partners with electronic support as a means of transaction or organization, but not only purchases, payments for goods, and services, but also Cloud computing services allow companies to determine the capacity to meet demand and move according to the speed of business growth of the company but not at a speed determined by enterprise infrastructure. This allows companies to generate better time to market, speed up application delivery and ensure management of capital or operational costs. Cloud computing implementation in business requires consideration of business and IT requirements as well as selecting available cloud computing to formulate the right cloud strategy. The goal after the implementation of cloud computing is that users can expand cloud computing capabilities more efficiently. In addition to having the advantages of cloud computing, it also has risks, namely only providers who know physically what is happening with user data, when disasters occur sometimes the ability of providers to recover data is still a concern for users, and provider compliance with regulations and when experiencing bankruptcy is still uncertain.
Identification of Longan Species Based on Leaf Shape Texture and Color Using KNN Classification Lubis, Setia Adiyasa; Maulita, Yani; Syari, Mili Alfhi
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 3 No. 1 (2023): October 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v3i1.238

Abstract

This study aims to identify the type of longan based on the shape, texture and color of the leaves using KNN classification. With a method that can identify the type of longan automatically, farmers and researchers can obtain information more quickly and accurately about the type of longan that is being cultivated or studied. This can help in choosing the right variety, more efficient maintenance, and improve the quality and productivity of longan plants. This research is an experimental research consisting of eight steps, namely preparation, theoretical studies, data collection, data analysis and processing, testing and implementation and the last is the final stage. Based on research conducted at UD Mitra Tani on Jalan Madura No. 81 Kebun Lada, Kec. Binjai Utara, Binjai City, North Sumatra, the results of data analysis from longan leaves show that the most common type of longan found in the nursery is Red longan. This study was conducted to identify the dominant longan species in the population and gain a deeper understanding of the diversity of longan varieties in the region.
The Relationship Between Socioeconomic Status And Nutritional Status Of Toddlers In Buha Village Mapanget Sub-District Manado City (Literature Review) Tarigan, Herdianta; Mulia Saragih, Varellisia Sandjeri; Lumbantoruan, Helmalia; Pasaribu, Riris; Sianipar, Juni; Situmeang, Exaudya
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 3 No. 1 (2023): October 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59934/jaiea.v3i1.240

Abstract

Nutritional status is the state of the body as a result of food consumption and nutrient use. Nutritional status is influenced by several factors, one of which is socioeconomic level. Children under five years old (toddlers) are the "golden age" in growth and development. Toddlers are the age group that most often suffers from malnutrition. Malnourished toddlers can be caused by family socioeconomic factors. Socioeconomic status as the root of malnutrition related to the purchasing power of food in households has an impact on the fulfillment of nutrients. The purpose of the study was to determine the relationship between socioeconomic status and nutritional status of toddlers in Buha Village, Mapanget District, Manado City. The research method is analytical with a cross sectional approach. The samples used were 71 toddlers using purposive sampling techniques. The data collection process uses questionnaires and is statistically tested with percentage formulas to answer the first and second statements, Spearmen Correlation tests to answer the third statement. The results of the study found that the picture of socioeconomic status is low income, the picture of nutritional status of toddlers is more nutrition and there is no significant relationship between socioeconomic status and nutritional status of toddlers with a value of p = 0.60>0.05. It can be concluded that there is no significant relationship between socioeconomic status and nutritional status of toddlers in Buha Village, Mapanget District, Manado City. Recommendations for further researchers to add other variables, namely factors that affect the nutritional status of toddlers, namely hygiene, environmental sanitation, where poor environmental conditions allow various diseases to occur, including malnutrition and even malnutrition.

Page 6 of 43 | Total Record : 430