Taronisokhi Zebua, Taronisokhi
Unknown Affiliation

Published : 14 Documents
Articles

Found 14 Documents
Search

SISTEM PENDUKUNG KEPUTUSAN PEMILIHAN PERUMAHAN DENGAN METODE SIMPLE ADDITIVE WEIGHTING (SAW)

MEDIA INFORMATIKA BUDIDARMA Vol 1, No 2 (2017): Juni 2017
Publisher : STMIK Budi Darma

Show Abstract | Original Source | Check in Google Scholar

Abstract

Housing is a basic human need and needs to be nurtured and developed for the sake of the continuity and improvement of peoples lives and settlements that can not be seen as a means of necessity solely, but more than that is the process of human settlements in creating a space of life to socialize themselves in expressing their identity. During this time customers make housing selection based on information from others, observing housing and experience by not considering the criteria needed so often cause new problems for the customer after buying housing. Problems such as inconvenience, credit installment problems and so forth. Decision support systems are generally defined as a system capable of producing solutions and problem- solving. Decision support systems are not intended to replace decision-making roles, but to assist and support decision makers. One of the most commonly used methods in decision support systems is the simple additive weighting (SAW) method. This simple additive weighting method can determine the preference value of each alternative, then perform the warfare process that can select the best alternative from a number of alternatives available.

Pengamanan Citra Digital Berdasarkan Modifikasi Algoritma RC4

Jurnal Teknologi Informasi dan Ilmu Komputer Vol 4, No 4: Desember 2017
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Original Source | Check in Google Scholar | Full PDF (694.928 KB)

Abstract

AbstrakCitra digital yang bersifat pribadi dan rahasia sangat rentang terhadap penyadapan oleh pihak-pihak lain, terutama bila citra tersebut didistribusikan melalui internet. Tindakan penyadapan dan penyalahgunaan terhadap citra yang sifatnya rahasia tentu saja dapat merugikan pihak pemilik citra. Salah satu teknik untuk meminimalkan tindakan tersebut di atas adalah pemanfaatan teknik kriptografi. Teknik kriptografi dapat mengamankan citra digital dengan cara modifikasi nilai-nilai pixel citra sehingga citra yang dihasilkan berbeda dengan citra asli. Algoritma RC4 dapat digunakan sebagai salah satu algoritma dalam mewujudkan tujuan teknik kriptografi. Namun algoritma ini memiliki kelemahan di mana pemecahan algoritma ini dengan know plaintext attack atau know ciphertext only dapat dilakukan dengan mudah. Penelitian ini menguraikan pengamanan citra digital berdasarkan modifikasi algoritma RC4. Modifikasi yang dilakukan adalah menambahkan sebuah blok intial vector pada proses enkripsi maupun dekripsi serta melakukan pemindahan sejumlah bit pada posisi tertentu. Hasil penelitian ini adalah citra digital dengan nilai-nilai pixel yang jauh berbeda dengan nilai pixel aslinya dengan tujuan dapat mempersulit pihak lain dalam memanipulasi citra rahasia.Kata kunci: kriptografi, citra, algoritma, RC4, cipher aliran.AbstractDigital images of a private and confidential verry extend to wiretapping by other parties, especially when the image is distributed over the internet. The tapping or misuse of the confidential private image of course, harm the image owner. One technique to minimize the above measures is the utilization of cryptographic techniques. Cryptography techniques can secure digital images by modifying the image pixel values so that the resulting image is different from the original image. RC4 algorithm can be used in realizing the purpose of cryptographic technique. But this algorithm has a weakness where the solving of this algorithm with know plaintext attack or know ciphertext only can be done easily. This research describes the security of digital images based on RC4 algorithm modification. The modification is to add a initial vector block in the process of encryption and decryption and shift a number of bits in a certain position. The results of this research is a digital image with pixel values that are much different from the original pixel value to make it difficult for others in manipulating the secret image.Keywords: cryptography, image, algorithm, RC4, stream cipher.

Optimalisasi Beaufort Cipher Menggunakan Pembangkit Kunci RC4 Dalam Penyandian SMS

J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 2, No 1 (2018): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Original Source | Check in Google Scholar

Abstract

The key in the cryptography algorithm is a very important role in the process of encryption and decryption. The more random key numbers are used, the more random the ciphers are generated. The RC4 algorithm and the Beaufort cipher are algorithms of cryptographic techniques. The RC4 algorithm has advantages in generating random keys, whereas Beaufort ciphers have a disadvantage in terms of the number of keys used too much. This research describes how to optimize key formation in Beaufort algorithm by utilizing the key generation process on the RC4 algorithm which is implemented on encoding SMS which until now has not been point-to-point (not directly sent to destination). The results of this study provide convenience for users in the process of generating encryption and decryption keys and generate SMS cipher more random and difficult to understand by others.

Aplikasi Saran Buku Bacaan Bagi Pengunjung Perpustakaan AMIK STIEKOM Sumatera Utara Berdasarkan Algoritma Brute Force

Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 3 (2018): Edisi Juli
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Original Source | Check in Google Scholar

Abstract

Service of information about books in a library is very helpful and makes it easier for visitors to find the book they want to find. Presentation of information on books available in the library of AMIK Stiekom North Sumatra has not been effective and efficient, because it is still done by looking at the library employee records on the list of books that have been provided. This problem becomes one of the factors to decrease interest in reading the library visitors. Utilization of application suggestions reading books in the library of AMIK Stiekom North Sumatra can be used as a trigger of the interest of visitors to keep reading books available in the library. The built-in book suggestion app works based on brute-force algorithms so that it can present book information relevant to the topic being searched by the visitors.

Message Security on Chat App based on Massey Omura Algorithm

IJISTECH (International Journal Of Information System & Technology) Vol 1, No 2 (2018): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Original Source | Check in Google Scholar

Abstract

Security of message on chat apps is very important to do so that messages that distributed always safety for others who do not have access permission. However, not all chat apps currently have tools that used to secure messages. This is still often overlooked, thus providing an easy space for the attackers to hack messages that are distributed. This research explains the usage of the massey-omura algorithm to secure text type message in chat apps when message distributed

SISTEM INFORMASI ABSENSI MAHASISWA STMIK BUDI DARMA MEDAN BERBASIS WEB MOBILE

KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Original Source | Check in Google Scholar

Abstract

Pendataan kehadiran atau absensi mahasiswa sangat penting dalam pelaksanaan kegiatan akademik pada setiap perguruan tinggi termasuk di STMIK Budi Darma Medan. Masalah yang sering terjadi selama ini adalah banyaknya kesalahan penginputan jumlah kehadiran mahasiswa ke dalam sistem informasi akademik kampus yang dilakukan oleh pegawai program studi. Kesalahan tersebut sangat berpengaruh pada penentuan keikutsertaan mahasiswa pada ujian akhir semester maupun pada penetapan nilai ujian akhir mahasiswa pada Kartu Hasil Studi (KHS) oleh dosen pengampu matakuliah. Hal inilah yang menjadi salah satu faktor terjadinya complain nilai akhir ujian semester dari mahasiswa kepada program studi maupun dosen pengampu matakuliah. Salah satu solusi yang dianggap efektif untuk menyelesaikan permasalahan di atas adalah membangun sebuah layanan informasi absensi mahasiswa berbasis web yang langsung dapat diakses oleh masing-masing dosen pada saat melaksanakan absensi mahasiswa. Layanan ini diyakini sangat membantu entitas yang berperan dalam pengolahan data absensi kehadiran mahasiswa menjadi informasi yang lebih akurat. Layanan ini juga dapat dimanfaatkan oleh orangtua mahasiswa untuk mengontrol dan mengetahui kehadiran anaknya.

IMPLEMENTASI METODE VIKOR DALAM PENERIMAAN JURNALIS PADA KORAN WASPADA MEDAN

KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 2, No 1 (2018): Peranan Teknologi dan Informasi Terhadap Peningkatan Sumber Daya Manusia di Era
Publisher : STMIK Budi Darma

Show Abstract | Original Source | Check in Google Scholar

Abstract

The reception of journalists at the Waspada Daily Medan always went through several rigorous selections before being determined to be accepted as journalists at the Waspada Medan Daily. There are several criteria that must be possessed by each participant as a condition for becoming a journalist in the Daily Alert Medan. To get the best participants, the Waspada Medan Daily needed a decision support system. Decision Support Systems (SPK) are part of computer-based information systems (including knowledge-based systems (knowledge management)) that are used to support decision making within an organization or company. Decision support systems provide a semitructured decision, where no one knows exactly how the decision should be made. In this study the authors applied the VlseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR) as the method to be applied in the decision support system application. The VIKOR method is part of the Multi-Attibut Decision Making (MADM) Concept, which requires normalization in its calculations. The expected results in this study can obtain maximum decisions.Keywords: Journalist Acceptance, Decision Support System, VIKOR

IMPLEMENTASI ALGORITMA ADVANCED ENCRYPTION STANDARD DAN TRIPLE DATA ENCRYPTION STANDARD UNTUK MENGAMANKAN CITRA DIGITAL

KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 2, No 1 (2018): Peranan Teknologi dan Informasi Terhadap Peningkatan Sumber Daya Manusia di Era
Publisher : STMIK Budi Darma

Show Abstract | Original Source | Check in Google Scholar

Abstract

Digital images that are personal and confidential are very vulnerable to wiretapping by irresponsible parties. Especially if distributed via the internet network such as on Facebook, WhatsApp and e-mail chat based applications. Images that are sent sometimes are often confidential images and must be maintained. In order to maintain the security of digital images can be done by utilizing cryptographic techniques. Cryptographic techniques can secure digital images by changing pixel values from digital images so as to produce different pixel values from the original image to be secured. This research will use AES 128 bit and Triple DES methods for encryption and decryption of digital images on client-server based applications. The results of the encryption AES algorithm will be re-encrypted with the Triple DES Algorithm so as to produce pixel values that are far different from the original pixel values. Keywords: cryptography, image, AES, Triple DES

SISTEM PENDUKUNG KEPUTUSAN PEMILIHAN INTERNET SERVICE PROVIDER MENERAPKAN METODE ELIMINATION AND CHOICE TRANSLATION REALITY (ELECTRE)

KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Original Source | Check in Google Scholar

Abstract

Internet users find it difficult to compare and know the quality of services provided by Internet Service Providers (ISP), most Internet users choose an Internet Service Provider (ISP) based on the experience and advice of other users. This is not necessarily appropriate to the needs, because a valid decision must be considered and taken into account from the criteria available to obtain a decision. Decision support systems are designed to help decision making and are interpreted as a datadriven model system that has procedures in data processing and data processing results used to make a decision. Therefore, with the construction of decision support systems can help Internet users in making more efficient decisions. The method used in decision support systems is Elimintaion And Choice Translation Realty (ELECTRE). with the establishment of an Internet Service Provider (ISP) decision support system by applying the ELECTRE method that is expected to assist internet users in determining the Internet Service Provider (ISP) that suits their needs.

PENERAPAN THE EXTENDED PROMETHEE II (EXPROM II) UNTUK PENENTUAN PRODUK DISKON

KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Original Source | Check in Google Scholar

Abstract

Salah satu alternatif strategi pemasaran yang dilakukan oleh Swalayan Palem Store adalah pemberian diskon atau potongan harga untuk produk-produk tertentu dalam periode waktu tertentu. Penentuan produk diskon harus dilakukan dengan pertimbangan dan perhitungan yang tepat. Kesalahan dalam penentuan produk diskon membuat swalayan kehilangan keuntungan bahkan mengalami kerugian. Salah satu solusi untuk permasalahan tersebut dengan menggunakan Sistem Pendukung Keputusan (SPK). Sistem Pedukung Keputusan (SPK) dapat membantu pimpinan swalayan dalam mengambil keputusan untuk menentukan produk diskon yang tepat dan meningkatkan efesiensi keputusan tersebut. Sistem pendukung keputusan memiliki beberapa tahapan sebelum menyelesaikan permasalahan yang ada. Tahapan-tahapan tersebut antara lain studi kelayakan, perancangan, pemilihan dan implementasi.The Extended Promethee (EXPROM II) merupakan salah satu metode penentuan urutan atau prioritas dalam analisis multikriteria. EXPROM II membandingkan alternatif yang satu dengan alternatif yang lainnya dan menghitung jarak selisih alternatif berpasangan sehingga menghasilkan output yaitu perangkingan alternatif berdasarkan nilai net flow tertinggi. Penentuan produk diskon yang tepat dan efektif memberikan dampak positif untuk swalayan karena dapat meningkatkan penjualan secara keseluruhan.