cover
Contact Name
Nelly Khairani Daulay
Contact Email
nellykhairanilestari@gmail.com
Phone
+6282370070808
Journal Mail Official
mesran.skom.mkom@gmail.com
Editorial Address
Jalan sisingamangaraja No 338 Medan, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
Bulletin of Artificial Intelligence
ISSN : -     EISSN : 29623944     DOI : -
The field of study of the Bulletin of Artificial Intelligence journal, in the field of Artificial Intelligence, includes: 1) Decision Support Systems, 2) Data Mining, 3) Expert Systems, 4) Big Data, 5) Text Mining, and 6) Natural Language Processing. But does not rule out the possibility of publishing manuscripts in the field of Computer Science.
Articles 26 Documents
Penerapan Algoritma Rought Set Untuk Memprediksi Jumlah Permintaan Produk Suci Utari
Bulletin of Artificial Intelligence Vol 1 No 1 (2022): April 2022
Publisher : Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data Mining is a term used to describe the discovery of knowledge in databases. Data mining is a process that uses statistical, mathematical, artificial intelligence, and machine learning techniques to extract and identify useful information and tied knowledge from large databases. Demand is a number of goods purchased or requested at a certain price and time. Demand is related to consumer desires for goods and services to be fulfilled. And the tendency of consumer demand for goods and services is unlimited. According to the everyday sense of demand is defined in absolute terms, namely the number of goods needed. This way of thinking is based on the idea that humans have needs. For this need, the individual has a demand for goods, the more residents of a country, the greater the public's demand for goods. Rapid Miner is open source software. Rapid Miner is a solution for analyzing data mining, text mining and clustering analysis. Rapid Miner uses a variety of descriptive and predictive techniques to provide users with insights so they can make the best decisions
Analisa Dan Perbandingan Algoritma Whirpool Dan Sha-512 Dalam Penyandian Data Gambar Darwis Pardamean Purba
Bulletin of Artificial Intelligence Vol 1 No 1 (2022): April 2022
Publisher : Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Image file is a form of collaboration which is located between points, lines, fields and also colors which will be very useful for imaging something, digital images are representations of light intensity functions in discrete form on a two-dimensional plane. An image file can be said to be original or original if the image does not experience the slightest change in any structure of an image. Manipulation of a file often occurs and is carried out by irresponsible people to provide benefits for that person, it is necessary to have a technique used to maintain the originality of a file or detect the authenticity of the image file, a technique can be used, namely Cryptography techniques. Cryptography is a science that studies how to keep data or messages safe when sent, from sender to recipient without experiencing any interference from irresponsible parties. A hash function is a one-way function that converts a set of strings into a set of strings whose size is smaller than the original size. The hash function has many uses, such as to maintain data integrity, delivery time efficiency, and to minimize the length of diverse data. The real-world applications of hash functions vary, such as being used to check the originality of data, to store keywords in databases, and much more. In this study, 2 existing hash functions will be discussed, namely the SHA-512 hash function, and the whirlpool hash function. SHA-512 is a variant of SHA-2 designed by the National Security Agency (NSA), while the Whirlpool hash algorithm was developed by 2 people, Vincent Rijmen and Paulo S.L.M. Barreto. These two hash functions are hash functions that are considered to have high security. In these two hash algorithms, there is still no collision in the hash value. This study will discuss the differences and similarities of the two algorithms
Perancangan Perangkat Lunak Teks Editor Bahasa C Menggunakan Metode Lexical Analyzer Mahmudin Harahap
Bulletin of Artificial Intelligence Vol 1 No 1 (2022): April 2022
Publisher : Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A computer is a machine that can carry out a set of basic commands (instruction set), so that a computer can do something, we must give it a command that the computer can carry out, namely in the form of a collection of these basic commands. DOS (Disk Operating System) Programming is the name given to programming carried out in the DOS environment, DOS Programming experienced its heyday when the operating system did not have an attractive GUI and did not have a large memory, Turbo C was one of the most widely used programming languages. at the time. Lexical analyzer is a method or technique commonly used to recognize the form of writing, the form of writing here is the commands contained in a programming language, the process of recognizing these commands is of course based on the compiler in the program language used, these commands will be distinguished by functions of existing commands, such as strings, variables, functions and others, this is used to make it easier for programmers to distinguish existing commands. In the Lexical analyzer method the word is called a token, where the Lexical analyzer scans the characters that match the tokens that have been set. The tokens identified in this study are verbs, where the verb consists of pure and verbs that have affixes
Implementasi Algoritma Quicksort Untuk Pembangkitan Kunci Algoritma Elgamal Pada Pengamanan Data File Dokumen Al-Amansyah Al-Amansyah
Bulletin of Artificial Intelligence Vol 1 No 1 (2022): April 2022
Publisher : Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A valid document is an important article containing information. Typically, documents are written on paper and the information is written in ink either by hand or using electronic media. For that we need a security system to secure the contents of the documents contained therein. In this research, a cryptographic method is used that will ensure the security of a document file. In this research, there is a security process that uses the Elgamal algorithm method as a solution to the implementation of the Quicksort algorithm method for document files. The results of this study indicate that the visual basic application can determine whether document files are safe or not. Using this method can help by securing the contents of a document file so that it is not known easily. Quicksort implementation that uses the Elgamal algorithm will be implemented using the visual basic application as evidence of the results of securing document files safely
Perancangan Aplikasi Duplicate Video Scanner Menerapkan Algoritma Sha-256 Rewindo Siregar
Bulletin of Artificial Intelligence Vol 1 No 1 (2022): April 2022
Publisher : Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this increasingly advanced era, new technologies that have never been imagined before are increasingly emerging, starting from the emergence of computers, cellphones, and many more. One of the emerging technologies is MPEG4 (Moving Picture Expert Group)-4 Video Player 3 or better known as MP4. MP4 Player can make a person listen to video digitally, no need to use cassettes or CDs like in the past and allows millions of people around the world to exchange music recordings through computers connected to computer networks. MP4 format which is commonly played by MP4 Player is one of the most frequently used video formats in video data storage. In cryptography there is a hash function which is a one-way encryption that produces a value that has a fixed length of a message. In this case the intended message is a video file. The hash function can be used to generate the identity of a video file, where if there are two or more video files that have the same hash value, it can be concluded that the video file is duplicate or duplicate. This will certainly make it easier for users to delete duplicate or duplicate video files.
Implementasi Algoritma Support Vector Machine untuk Analisis Sentimen LGBT di Indonesia Mustakim Mustakim; Muhammad Ridwan; Nanda Try Luchia
Bulletin of Artificial Intelligence Vol 1 No 2 (2022): October 2022
Publisher : Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

LGBT cases began to appear openly in Indonesia in 2016. This case has received a lot of discussion in that year until now because of the number of people who commented agreeing and disagreeing with actions, activities, and the existence of the LGBT gender in Indonesia. The sentiments from the community's comments refer to various aspects of life so as to produce community opinions that are positive, negative and neutral. Seeing this, it is necessary to perform a classification and analysis of tweet sentiments to see the tendency of each community's opinion. Analysis and classification is done with text mining data processing techniques using the Support Vector Machine (SVM) algorithm. The classification process is done in 3 stages with the division of data 90%:10%, 80%:20% and 70%:30% using 3 kernels namely linear, polynominal and Radial Basic Function (RBF). The classification results obtained from the three kernels show that the tendency of society's view of LGBT cases is negative and neutral which is shown with the highest accuracy on the linear and RBF kernels. The SVM experiment produced an accuracy of 74% on the linear kernel with 90%:10% and 74% data experiments and on the RBF kernel with C=100 gamma=0,01. The grouping of this tweet sentiment data resulted in an analysis of the tendency not to support or disagree with the LGBT gender because it is not in accordance with the established basis in the country of Indonesia which prioritizes religious aspects over other aspects
Implementasi Algoritma Adaptive Huffman Coding Pada Aplikasi Kamus Kedokteran Berbasis Android Rio Parmana
Bulletin of Artificial Intelligence Vol 1 No 2 (2022): October 2022
Publisher : Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Technological advances that continue to develop in the era of globalization demand progress from all fields that can provide convenience in presenting information and sending information, with the increasing number of current internet users the information presented is increasing, one of which is information in the form of text such as warning messages, appeals or text that describes an event in the form of text information is used more often than in other forms. The size of the file or text file can be overcome by using a compression or compression process. Compression is a process to reduce the size of a file so as to save storage space and the process of exchanging data. The Huffman algorithm compression technique is able to provide memory usage savings of up to 30%. The Huffman coding algorithm has a complexity of 0(n log n) for a set of n characters
Implementasi Algoritma Redundant Pattern Encoding Untuk Menyisipkan Pesan Teks Ke Dalam Gambar dan Algoritma Fibonacci Codes Untuk Kompresi Frayogi Aditiya
Bulletin of Artificial Intelligence Vol 1 No 2 (2022): October 2022
Publisher : Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Information is a collection of data in the form of unified text that is public or confidential. Confidential data is data that contains something or that is not for publication. One way to secure the data is to use Steganography techniques. This provides tremendous benefits for maintaining data confidentiality. In steganography there are several methods, one of which is Redundant Pattern Encoding. However, from this process, the object that will be used as a container to accommodate the data will experience a change in the size of the data. This can raise the suspicion of many parties who want to access the data. This study describes how the procedure is carried out to compress objects that are used as containers to insert messages. The process uses the Fibonacci Codes method which is a simple and very simple data compression method. The results of this research will produce a stronger level of data security.
Analisis Perbandingan Algoritma Longest Common Subsequence Dengan Simple Hill Climbing Pada Permainan TTS Yardani Yardani
Bulletin of Artificial Intelligence Vol 1 No 2 (2022): October 2022
Publisher : Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Crossword is a game to sharpen the brain. Crossword puzzles can be used in the field of education to test students' abilities, so that the questions used are adapted to their needs. But it will be difficult if a large number of questions are used, because to make a crossword puzzle from a set of questions, the possible combinations of existing words form a crossword puzzle. Research in optimizing the filling of empty spaces in the crossword matrix board certainly requires an algorithm using a comparison of the Longest Common Subsequence (LCS) algorithm and the Simple Hill Climbing algorithm. By comparing the performance of the Longest Common Subsequence (LCS) algorithm and the Simple Hill Climbing algorithm, it will be known how the work and performance in terms of speed and accuracy of the two algorithms work. The questions displayed in the crossword application are obtained from the database access randomly by the program. The crossword puzzle that is formed is a collection of answers to the questions used, the answers to the questions are arranged in such a way that they intersect with one another. On this matrix board, the answers to the questions will be placed to form a crossword puzzle. Each letter of the answer will occupy one cell on the matrix board. The number of questions is the number of questions that will be used in the crossword game. Apart from receiving input from the user, the application also provides output to the user in the form of a crossword puzzle and the correct answer from the TTS
Penerapan Algoritma Rabin-Public Key Untuk Pengamanan File Audio Rusdianto Rusdianto; Natalia Silalahi; Norenta Sitohang
Bulletin of Artificial Intelligence Vol 2 No 1 (2023): April 2023
Publisher : Graha Mitra Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data encoding problems such as text files, images, audio and video are used more often as messages or information. However, with advances in technology that are increasingly developing, it is increasingly possible for messages or information to be stored in the form of other files such as images, audio and video. For example, a music recording company wants to release the latest album and they want to get a big profit from selling CDs or downloading legally (paid) through the site. Before the album officially goes out to the public, they want to make sure that no one party gets a leak or listens to the audio file first. One of the technical solutions that can be used to protect the confidentiality of audio files is cryptography by applying the Rabin-Public Key algorithm. The Rabin-p algorithm is an algorithm that implements an asymmetric key. An asymmetric key is a key that uses two types of keys, namely the public key which is used to encrypt the message and the secret key which is used to decrypt the message. Rabin-p is named rabin with an additional p which symbolizes that the proposed scheme uses only one prime p as the decryption key. The results for encoding audio files are based on an asymmetric cryptographic system that uses a public key and a private key for encoding audio files (the key used for the encryption process). and decryption) into a cipher so that the security and confidentiality of messages are maintained. Audio file analysis is the stage where analysis is carried out on any files that are processed in a design system or procedure, in this case the audio files to be encrypted and decrypted in cryptographic applications are audio files in wave format (*.WAV).

Page 1 of 3 | Total Record : 26