Journal of Informatics, Electrical and Electronics Engineering
Fokus kajian Journal of Informatics, Electrical and Electronics Engineering, yaitu: 1. Control System, 2. Artificial Intelligence, 3. Informatics Engineering, 4. Electronics, 5. Advanced energy material, 6. Automatic power control, 7. Battery technology, 8. Distributed generation, 9. Distribution system, 10. Electric power generation, 11. Electric vehicle, 12. Electrical machine, 13. Energy optimization, 14. Energy conversion, 15. Energy efficiency, 16. Energy exploitation, 17. Energy exploration, 18. Energy management, 19. Energy mitigation, 20. Energy storage, 21. Energy system, 22. Fault diagnostics, 23. Green energy, 24. Green technology, 25. High voltage, 26. Insulation technology, 27. Intelligent power optimization, 28. Monitoring operation, 29. Motor drives, 30. Natural energy source, 31. Power control, 32. Power data transaction, 33. Power economic, 34. Power electronics, 35. Power engineering, 36. Power generation, 37. Power optimization, 38. Power quality, 39. Power system analysis, 40. Power system information, 41. Power system optimization, 42. Protection system, 43. Renewable energy, 44. SCADA, 45. Security operation, 46. Smart grid, 47. Stability system, 48. Storage system, and 49. Transmission system
Articles
72 Documents
Implementasi Kriptografi Hybrid Algoritma Elgamal Dan Double Playfair Cipher Dalam Pengamanan File Jpeg Berbasis Dekstop
Irwansyah Putra Sinaga
Journal of Informatics, Electrical and Electronics Engineering Vol. 1 No. 2 (2021): Desember 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Digital image is a representative of the image taken by the machine with a form of approach based on sampling and quantization. Sampling states the size of the boxes arranged in rows and columns. In other words, sampling on the image states the size of the pixels (dots) in the image, and quantization states the value of the brightness level expressed in grayscale values ??according to the number of binary bits used by the machine, in other words quantization in the image represents the number of colors in the image. It is very important in securing digital images from parties who do not have access rights is very important. If important information in the form of digital images falls into the wrong hands, it will cause unwanted things, for example image manipulation in a negative form and can harm the owner of the image. In solving this problem, the author uses the ElGamal method which is used to maintain the security of the data by calculating the discrete logarithm of a group of prime integers in which the multiplication operation is carried out and combining it with the Double Playfair Cipher method to encode the image encryption and the ElGamal Algorithm to encrypt the key. from Double Playfair Cipher. The image is first encrypted using the Double Playfair Cipher Algorithm, then the Double Playfair key is encrypted using the ElGamal Algorithm. The result of testing the designed application is the formation of a public key and a private key which is carried out in encrypting and decrypting an image file so that the exchange of information in the form of digital images can be carried out safely.
Penerapan Jaringan Saraf Tiruan Backprogation Dalam Memprediksi Jumlah Pasien Rumah Sakit
Dea Dwi Rizki Tampubolon;
Irfan Sudahri Damanik;
Harly Okprana
Journal of Informatics, Electrical and Electronics Engineering Vol. 1 No. 2 (2021): Desember 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Artificial Neural Network is one of the artificial representations of the human brain that always tries to simulate the learning process in the human brain. Artificial Neural Network (ANN) is defined as an information processing system that has characteristics similar to human neural networks. ANN is an information processing system that has similar characteristics to a biological neural network. The hospital is an integral part of a social and health organization with the function of providing services, healing disease and preventing disease to the community. Backpropagation network is one of the algorithms that are often used in solving problems. complicated problem. This algorithm is also used in regulatory applications because the training process is based on a simple relationship. The problems that occur at the Djasemen Saragih Pematangsiantar Hospital are the lack of doctors working at the hospital so that there is a density of patients that occur every year, and the absence of patient rooms that are placed at home. ill when there was an increase that was not recognized by the hospital. With the data available every year, it is expected that the use of artificial neural networks using the backprogation method is very useful for the hospital in determining the prediction of the number of hospital patients for the next year can be used as the basic material for changes or additional patient rooms when there is an excess of predicted patients.
Aplikasi Pengenalan Identitas Gambar Dengan Menggunakan Metode Backpropagation
Marni Damanik
Journal of Informatics, Electrical and Electronics Engineering Vol. 1 No. 3 (2022): Maret 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
With today's technological developments, many types of identifier systems have been developed for the benefit of users of the technology. This recognition system is used for some objects or also on humans. Image recognition applications have great hopes for the future. Start with the introduction of sketch images or static photos in a certain format. Of course, this is supported by the development of science and technology in the fields of image processing, analysis, and image understanding. To recognize the identity of the image so far it is very rare, but in this study describes how to identify the identity of the image with human photos. The image (image) in question is an image or human image whose identity is not known. Currently, many manipulate images or photos with the same image. However, it is not known which one was manipulated and which one was genuine. Based on these problems, it is necessary to apply an identity recognition system so that it can be known which ones are manipulated and which ones are genuine, by applying the backpropagation method. According to previous research entitled facial recognition applications using the backpropagation algorithm and voila jones with the authors Sayuti Rahman, Emil Fitranhah, Andi Marwan Elhanafi stated that to be able to recognize a person's image with the backpropagation algorithm, one must go through several stages of training and testing stages. Image is a method found in artificial neural networks. Where the artificial neural network is an artificial representation of the human brain which always tries to simulate the learning process in the human brain. one of them is the backpropagation method, backpropagation is one of the artificial neural network models that has the ability to get a balance between the network's ability to recognize the patterns used during training and the network's ability to provide the correct response to input patterns that are similar (but not the same) with the same pattern. used during training.
Penerapan Metode Cart Dalam Memprediksi Penjualan Produk Fast Moving Dan Slow Moving
Fuspita Dewi Savitri
Journal of Informatics, Electrical and Electronics Engineering Vol. 1 No. 4 (2022): Juni 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The need for precise, precise and accurate information has become a material for companies, organizations or agencies with an interest in making and obtaining decisions that will be achieved. Decisions taken are more precise, they must be supported by relevant and accurate data. The use of information technology can generate profits and increase the efficiency of a company. The very rapid advancement of information technology creates problems in predicting fast moving and slow moving products. The problem arises because the company has not been able to anticipate things that will come in influencing the company's operations, precisely at PT. Matahari Department Store Thamrin Plaza Medan. The decision tree produced by CART is a binary tree that has attribute values ??by selecting the most optimal branching in calculating each variable. The principle of the classification tree is to separate all observations into two groups of observations into the next two groups of observations in order to obtain the minimum number of observations for each observation group.
Aplikasi Pengolahan Citra Mri Untuk Deteksi Area Kanker Otak Dengan Menggunakan Metode Robinson
M.Albi Armansyah
Journal of Informatics, Electrical and Electronics Engineering Vol. 1 No. 3 (2022): Maret 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Brain cancer can originate from neural elements in brain tissue that are not normal, this brain cancer is primary or is a metastasis. Disorders caused by brain cancer can damage the central nerves in the brain and result in cognitive nervous system damage. Based on data compiled by the International Agency for Research on Cancer, more than 126,000 people worldwide suffer from brain cancer each year and more than 97,000 die. Several things are related because it is difficult to see visually because in general the boundaries are not clear what else if it is still at an early stage, the contrast is not clear and sometimes even resembles normal tissue. The problem faced by experts is that it is difficult to distinguish brain cancer from normal tissue if the age of brain cancer is still in its early stages because the contrast is still not clear. The Robinson method was introduced by Robinson in 1997. This operator is identical to a 6x6 matrix with H1 to H8, because a 3 level Robinson operator convolution table calculates the direction and presence of an edge is done in 2 steps, the main step of the calculation method is the same as the Kirsch calculation, the difference is only on the mask (kernel) value
Implementasi Metode Text Mining Frequency-Invers Document Frequency (Tf-Idf) Untuk Monitoring Diskusi Online
Shalvan Chamira
Journal of Informatics, Electrical and Electronics Engineering Vol. 1 No. 3 (2022): Maret 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Discussion is an interaction between two or more people. Usually, this exchange takes place between these groups in the form of basic knowledge or the like, and in the end this knowledge will give a good and correct understanding. Discussions can take the form of anything that was originally called a topic or dialogue. Starting from the topic, discussing and discussing, eventually it will make people understand the topic. Forum is a forum or a meeting place for several people whose aim is to exchange opinions on topics or issues that are not related to the forum. This application was built using a programming language, and the results of testing on this application can be used as a method to discuss data or message security that can guarantee security without being noticed by unauthorized parties
Analisa Keaslian Tanda Tangan Dengan Menerapkan Algoritma Ripemd160
Jefri Sianipar
Journal of Informatics, Electrical and Electronics Engineering Vol. 1 No. 3 (2022): Maret 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Signature is one of the characteristics of every person. Signatures are widely used as a condition for ratifying legal documents. This becomes problematic if a transaction is problematic or fails due to signature forgery, of course this is very detrimental, so it is very important to verify the signature. One way to be able to identify a match signature is by utilizing image processing techniques. To get the identification of the signature match, the RIPEMD160 method is used which prioritizes processing the Hash value of a digital image to provide special characteristics for a digital image data, and at the same time as a data that will be used as a verifier for the authenticity of digital image data by processing the signature image and provides information that only the original signature would have. The result of this process will indicate that a signature matches or does not match and can distinguish itself from a signature that has an original verification and is not.
Modifikasi Algoritma Lucifer Dengan Menerapkan Pembangkitan Kunci Berdasarkan Naive Shuffle
Berkat Kasih Laia
Journal of Informatics, Electrical and Electronics Engineering Vol. 1 No. 3 (2022): Maret 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Data security is a matter of maintaining the confidentiality of information, especially those containing sensitive information that only authorized parties may know, especially if the transmission is done via a public network, what if the data is not secured first, it will be very easy to be tapped and retrieved. know the contents of the information by parties who do not have the authority. One way to secure it is to use cryptographic techniques, namely by using the Lucifer algorithm technique and then randomizing the keys based on the Naïve Shuffle, this is done so that the keys in the data are much more random and not easy to find out the contents. This technique can minimize the occurrence of a leak of confidential messages, and the sender does not have to worry about the message. This research is expected to produce and show results in securing messages and to make it easier for the community to secure secret messages.
Algoritma Machine Learning untuk penentuan Model Prediksi Produksi Telur Ayam Petelur di Sumatera
Ihsan Maulana Muhamad;
Sigit Anugerah Wardana;
Anjar Wanto;
Agus Perdana Windarto
Journal of Informatics, Electrical and Electronics Engineering Vol. 1 No. 4 (2022): Juni 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Laying hens eggs are one of the livestock commodities that make a very large contribution to the supply of eggs as a community need. Therefore, it is necessary to predict the egg production of laying hens in the future so that in the future the need for eggs in Indonesia is stable and can meet the demands of the Indonesian people. The method used in this research is a machine learning algorithm, namely Polak-Ribiere which is one of the artificial neural network methods that is often used to predict data. This study does not discuss the prediction results, but will discuss the ability of the Machine Learning algorithm to make predictions based on the egg production dataset of laying hens obtained from the Central Statistics Agency. The research data used is data on the production of laying hens in Sumatra from 2015-2020. Based on this data, network architecture models will be determined, including 4-5-1, 4-10-1, 4-15-1, 4-20-1, and 4-25-1. Of the five models, training and testing were carried out first and then obtained the results that the best architectural model was 4-25-1 with 0.03144841, the lowest among the other 4 models. So it can be concluded that the model can be used to predict the egg production of laying hens.
Sistem Pendukung Keputusan Pemilihan Atlet Renang Sumatera Utara Untuk Kejuaraan Tingkat Nasional Dengan Metode ARAS Dan ROC
Dwi Hardiyanti
Journal of Informatics, Electrical and Electronics Engineering Vol. 1 No. 4 (2022): Juni 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In this study, researchers used the ROC method and the ARAS method while the criteria used in the selection of North Sumatran swimming athletes for the national championship were Physical, Age, Weight, and Distance. A decision support system is a computer-assisted decision support process to assist decision support by using certain data and models to solve some unstructured problems. The calculation results from the application of the ROC method & the ARAS method were declared successful in testing the system in the assessment and ranking of the selection of North Sumatran swimming athletes for the national level championship based on the criteria inputted for alternatives. Then provide a definite assessment answer for swimming athletes who represent North Sumatra for the national level championship based on the final score obtained.