cover
Contact Name
Nelly Khairani Daulay
Contact Email
nellykhairanilestari@gmail.com
Phone
+6282370070808
Journal Mail Official
mesran.skom.mkom@gmail.com
Editorial Address
Jalan sisingamangaraja No 338 Medan, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
Bulletin of Artificial Intelligence
ISSN : -     EISSN : 29623944     DOI : -
The field of study of the Bulletin of Artificial Intelligence journal, in the field of Artificial Intelligence, includes: 1) Decision Support Systems, 2) Data Mining, 3) Expert Systems, 4) Big Data, 5) Text Mining, and 6) Natural Language Processing. But does not rule out the possibility of publishing manuscripts in the field of Computer Science.
Articles 6 Documents
Search results for , issue "Vol 1 No 1 (2022): April 2022" : 6 Documents clear
Penerapan Algoritma Rought Set Untuk Memprediksi Jumlah Permintaan Produk Suci Utari
Bulletin of Artificial Intelligence Vol 1 No 1 (2022): April 2022
Publisher : Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data Mining is a term used to describe the discovery of knowledge in databases. Data mining is a process that uses statistical, mathematical, artificial intelligence, and machine learning techniques to extract and identify useful information and tied knowledge from large databases. Demand is a number of goods purchased or requested at a certain price and time. Demand is related to consumer desires for goods and services to be fulfilled. And the tendency of consumer demand for goods and services is unlimited. According to the everyday sense of demand is defined in absolute terms, namely the number of goods needed. This way of thinking is based on the idea that humans have needs. For this need, the individual has a demand for goods, the more residents of a country, the greater the public's demand for goods. Rapid Miner is open source software. Rapid Miner is a solution for analyzing data mining, text mining and clustering analysis. Rapid Miner uses a variety of descriptive and predictive techniques to provide users with insights so they can make the best decisions
Analisa Dan Perbandingan Algoritma Whirpool Dan Sha-512 Dalam Penyandian Data Gambar Darwis Pardamean Purba
Bulletin of Artificial Intelligence Vol 1 No 1 (2022): April 2022
Publisher : Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Image file is a form of collaboration which is located between points, lines, fields and also colors which will be very useful for imaging something, digital images are representations of light intensity functions in discrete form on a two-dimensional plane. An image file can be said to be original or original if the image does not experience the slightest change in any structure of an image. Manipulation of a file often occurs and is carried out by irresponsible people to provide benefits for that person, it is necessary to have a technique used to maintain the originality of a file or detect the authenticity of the image file, a technique can be used, namely Cryptography techniques. Cryptography is a science that studies how to keep data or messages safe when sent, from sender to recipient without experiencing any interference from irresponsible parties. A hash function is a one-way function that converts a set of strings into a set of strings whose size is smaller than the original size. The hash function has many uses, such as to maintain data integrity, delivery time efficiency, and to minimize the length of diverse data. The real-world applications of hash functions vary, such as being used to check the originality of data, to store keywords in databases, and much more. In this study, 2 existing hash functions will be discussed, namely the SHA-512 hash function, and the whirlpool hash function. SHA-512 is a variant of SHA-2 designed by the National Security Agency (NSA), while the Whirlpool hash algorithm was developed by 2 people, Vincent Rijmen and Paulo S.L.M. Barreto. These two hash functions are hash functions that are considered to have high security. In these two hash algorithms, there is still no collision in the hash value. This study will discuss the differences and similarities of the two algorithms
Perancangan Perangkat Lunak Teks Editor Bahasa C Menggunakan Metode Lexical Analyzer Mahmudin Harahap
Bulletin of Artificial Intelligence Vol 1 No 1 (2022): April 2022
Publisher : Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A computer is a machine that can carry out a set of basic commands (instruction set), so that a computer can do something, we must give it a command that the computer can carry out, namely in the form of a collection of these basic commands. DOS (Disk Operating System) Programming is the name given to programming carried out in the DOS environment, DOS Programming experienced its heyday when the operating system did not have an attractive GUI and did not have a large memory, Turbo C was one of the most widely used programming languages. at the time. Lexical analyzer is a method or technique commonly used to recognize the form of writing, the form of writing here is the commands contained in a programming language, the process of recognizing these commands is of course based on the compiler in the program language used, these commands will be distinguished by functions of existing commands, such as strings, variables, functions and others, this is used to make it easier for programmers to distinguish existing commands. In the Lexical analyzer method the word is called a token, where the Lexical analyzer scans the characters that match the tokens that have been set. The tokens identified in this study are verbs, where the verb consists of pure and verbs that have affixes
Implementasi Algoritma Quicksort Untuk Pembangkitan Kunci Algoritma Elgamal Pada Pengamanan Data File Dokumen Al-Amansyah Al-Amansyah
Bulletin of Artificial Intelligence Vol 1 No 1 (2022): April 2022
Publisher : Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A valid document is an important article containing information. Typically, documents are written on paper and the information is written in ink either by hand or using electronic media. For that we need a security system to secure the contents of the documents contained therein. In this research, a cryptographic method is used that will ensure the security of a document file. In this research, there is a security process that uses the Elgamal algorithm method as a solution to the implementation of the Quicksort algorithm method for document files. The results of this study indicate that the visual basic application can determine whether document files are safe or not. Using this method can help by securing the contents of a document file so that it is not known easily. Quicksort implementation that uses the Elgamal algorithm will be implemented using the visual basic application as evidence of the results of securing document files safely
Perancangan Aplikasi Duplicate Video Scanner Menerapkan Algoritma Sha-256 Rewindo Siregar
Bulletin of Artificial Intelligence Vol 1 No 1 (2022): April 2022
Publisher : Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this increasingly advanced era, new technologies that have never been imagined before are increasingly emerging, starting from the emergence of computers, cellphones, and many more. One of the emerging technologies is MPEG4 (Moving Picture Expert Group)-4 Video Player 3 or better known as MP4. MP4 Player can make a person listen to video digitally, no need to use cassettes or CDs like in the past and allows millions of people around the world to exchange music recordings through computers connected to computer networks. MP4 format which is commonly played by MP4 Player is one of the most frequently used video formats in video data storage. In cryptography there is a hash function which is a one-way encryption that produces a value that has a fixed length of a message. In this case the intended message is a video file. The hash function can be used to generate the identity of a video file, where if there are two or more video files that have the same hash value, it can be concluded that the video file is duplicate or duplicate. This will certainly make it easier for users to delete duplicate or duplicate video files.
Perbandingan Algoritma Sequitur dan RLE Dalam Kompresi Teks Rian Syahputra
Bulletin of Artificial Intelligence Vol 1 No 1 (2022): April 2022
Publisher : Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Information on a news blog is not small if we look at the amount of information that will be conveyed in a news story. A news blog also uses a lot of storage memory in the database because of the large amount of information in the form of text that is stored, and also affects the speed of data transmission. Compression techniques aimed at reducing data can be used to reduce stored text and save storage media and speed up the data transmission process. Using the Sequitur algorithm is better with a compression ratio of 80.95% of the initial size, because the sequitur algorithm removes symbol pairs that appear more than once with a new symbol. While the RLE algorithm in this study cannot be used because it does not meet the RLE algorithm so that the compression process does not occur due to the absence of the same characters appearing successively, this is a weakness of the RLE algorithm

Page 1 of 1 | Total Record : 6