ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA
ISSN : -     EISSN : -
Articles 33 Documents
PERANCANGAN APLIKASI KEAMANAN FILE AUDIO FORMAT WAV (WAVEFORM) MENGGUNAKAN ALGORITMA RSA

Santoso, Heri, M. Fakhriza, M. Fakhriza

ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 2, No 1 (2018): April 2018
Publisher : ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA

Show Abstract | Original Source | Check in Google Scholar | Full PDF (676.395 KB)

Abstract

WAV file is a standard format that is widely used in multimedia and games on various platforms. Ease of access and development of technology with various media making it easier to exchange information to various places. Both important and confidential data need to be kept confidential because of various security threats so that data can be tapped and known by third parties during the submission process. One method of data security is cryptography using a public key algorithm that is poluler is RSA (Rivest Shamir Adleman). From these problems raised the idea to create a data security application whose function can perform data security using RSA algorithm. The programming language used is C # with Visual Studio software, the data being processed is a sample of each byte in a WAV file, the header will be the same as the beginning so that the WAV file can be played even if the information is disguised. RSA algorithms can be implemented into programming languages so that WAV files can be processed and secured data. Although the results of WAV file size after encryption becomes larger depending on the key used by existing information can be disguised properly.

PENENTUAN TEMPAT MENGINAP DENGAN MENGGUNAKAN FUZZY MULTIPLE ATTRIBUTE DECISION MAKING

Aprilia, Rima ( Program Studi Matematika,Fakultas Sains dan Teknologi Universitas Islam Negeri Sumatera Utara Medan ) , Triase, Triase ( Program Studi Sistem Informasi,Fakultas Sains dan Teknologi Universitas Islam Negeri Sumatera Utara Medan ) , Sriani, Sriani ( Program Studi Ilmu Komputer,Fakultas Sains dan Teknologi Universitas Islam Negeri Sumatera Utara Medan )

ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 1, No 01 (2017): November 2017
Publisher : ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA

Show Abstract | Original Source | Check in Google Scholar | Full PDF (340.177 KB)

Abstract

AbstractThe problem of determining where to eat every seminar activities outside the city becomes a problem experienced by the participants of the seminar. In determining where to stay, decision support system using fuzzy multiple attribute is expected to provide the best solution in this case. The type of research is literature study by looking for reference theory relefan with cases or problems found. References that include general decision making, problem formulation, decision making of some fuzzy attributes, and generating a decision matrix that is expected to provide the best solution of the problem. These references can be searched from books, journals, research report articles, and websites on the internet. The output of this literature study collects reference that relefan with the formulation of the problem. The goal is to strengthen the process and also become the basis for designing decision support systemsKeywords: Dual Attribute Decision Making, TOPSIS, Weighted Product

PENERAPAN ALGORITMA K-MEANS CLUSTERING PADA APLIKASI MENENTUKAN BERAT BADAN IDEAL

Nasution, Yusuf Ramadhan, Eka, Muhammad

ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 2, No 1 (2018): April 2018
Publisher : ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA

Show Abstract | Original Source | Check in Google Scholar | Full PDF (380.867 KB)

Abstract

    One application of computer technology in the medical world is to determine the ideal body weight (BMI) of a patient by comparing the body weight, height, and size of the patient's own skeleton, so doctors can determine the diet menu that is most suitable for such patients. This becomes very important, especially in the field of medicine, such as the field of beauty, athletes, or other fields that require ideal body shapes such as models, artists and so forth.    This ideal body weighting system is done by the ratio of height to body weight, and the size of the patient's frame. While the K-Means Clustering algorithm is an algorithm that can classify data based on benchmark values given and calculate the data group.    This system can be used to determine ideal body weight by applying BMI values as X coefficients and the patient frame size values as the Y coefficients and cluster central points are set first. However, this system still needs further development because there is no change facility to clustering data category, grouping process is shown in the form of animation, and the need of clustering category in store in one structured database. Keywords: Ideal Weight, K-Means Clustering Algorithm

BASCOM-AVR DAN KOMPONEN ATMEGA8535 DIIMPLEMENTASIKAN PADA PERANGKAT PENANGKAP IKAN

Armansyah, Armansyah

ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 2, No 1 (2018): April 2018
Publisher : ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA

Show Abstract | Original Source | Check in Google Scholar | Full PDF (517.027 KB)

Abstract

For fishermen, fishing traditionally is a job that takes a long time. The existence of a point where a bunch of fish gather is also difficult to determine if traditional methods are taught which sometimes get an estimate that often misses. This study aims to design a device that serves to catch fish automatically and apply the detection of the presence of fish in a shallow water. By using Atmega8535 microcontroller component, and BASCOM-AVR, fishing can be done easily because it implements tool automation on fish network. Keywords: Algorithm, Fish Catcher, Microcontroller, Atmega8535, BASCOM-AVR

Perancangan Perangkat Lunak Pengenkripsian Citra BMP,GIF dan JPG dengan Menggunakan Metode HILL

Hasugian, M.Kom, Abdul Halim ( Universitas Islam Negeri Sumatera Utara Medan )

ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 1, No 01 (2017): November 2017
Publisher : ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA

Show Abstract | Original Source | Check in Google Scholar | Full PDF (421.025 KB)

Abstract

Digital image can be defined as a function of two variables, f (x, y), where x and y are spatial coordinates and the value of f (x, y) is the image intensity at the coordinates. Digital images represent image data in numbers representing the level of gray (color black and white) or color coordinates (color image). The problem in this system is how to implement digital image cryptography using Hill Chiper method so as to ensure the security of the digital image from the parties which is not entitled to know it or make changes in the digital image. This digital image cryptography is designed using Hill Chiper method implemented with Visual Basic 6.0 programming language. Hill Chip method is a Hill Cipher method is one of the symmetric key cryptography algorithms. Hill Cipher algorithm uses an m x m matrix as the key for encryption and decryption. The basic matrix theory used in Hill Cipher is inter-matrix multiplication and inverse in matrix. This digital image cryptography produces an obscure and invisible digital image without the help of the software that the author designs, and changes the size of the digital image file by mapping the RGB value of each pixel of the digital image into a geometry . However, this system can only encrypt digital imagery with JPG, BMP, and GIF formats so it still needs further development. Keywords: Cryptography, Digital Imagery and Hill Chiper Method 

ANALISIS JARINGAN SYARAF TIRUAN UNTUK MENGETAHUI PENYEBAB DROP OUT PADA MAHASISWA

M. Fakhriza, M. Fakhriza, Santoso, Heri

ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 2, No 1 (2018): April 2018
Publisher : ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA

Show Abstract | Original Source | Check in Google Scholar | Full PDF (552.684 KB)

Abstract

Drop-out is a form of failure to follow the students in the educational process at university. The number of students drop out in addition detrimental to the personal / individual, it is also detrimental to higher education institutions themselves. Therefore, it is necessary to study to find the causes or factors that affect student drop-out so it can be useful information for success in higher education. Methods backpropagation artificial neural network is a mathematical model that is used for the identification and classification based training and learning is done. In this study, backpropagation artificial neural network method used in identifying factors - factors causing the drop-out experienced by the students by making learning of the data - the data attributes of students drop out. Backpropagation artificial neural network implementation is done in this study produces good results where backpropagation artificial neural network can produce factors that cause dropouts appropriate to attribute a given student. Keywords: Artificial Intelligence, Artificial Neural Network, Backpropagation

PENDEKOMPOSISIAN CITRA DIGITAL DENGAN ALGORITMA DWT

Sriani, Sriani ( Universitas Islam Negeri Sumatera Utara Medan ) , Triase, Triase ( Universitas Islam Negeri Sumatera Utara Medan ) , Khairuna, Khairuna ( Universitas Islam Negeri Sumatera Utara Medan )

ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 1, No 01 (2017): November 2017
Publisher : ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA

Show Abstract | Original Source | Check in Google Scholar | Full PDF (584.772 KB)

Abstract

The current large image storage capacity is increasingly important. This need, caused by the image to be stored more and more. Digital image processing in the field of image decomposition can be a solution to minimize memory needs in representing digital images. In this case the ratio in the decomposition process becomes the reference comparison between the decomposed image with the original image. In this research decomposition process using DWT algorithm. The image decomposition based discrete wavelet transform using the calculation system with the decomposition with the direction of the row and decomposition with the direction of the column. The decomposition process uses a leveling and subtraction formula by calculating the average value of two pairs of data. The results of this study indicate that the decomposition of digital images based on discrete wavelet transform is expected to be one useful algorithm in imaging technology for digital image decomposition. Keywords: digital image, decomposition, discrete wavelet transform

ANALISA DAN PERANCANGAN SISTEM PENDUKUNG KEPUTUSAN PEMILIHAN PASANGAN HIDUP MENURUT BUDAYA KARO DENGAN MENGGUNAKAN METODE ANALITYCAL HIERARCHY PROCESS (AHP)

Hasugian, Abdul Halim, Cipta, Hendra

ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 2, No 1 (2018): April 2018
Publisher : ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA

Show Abstract | Original Source | Check in Google Scholar | Full PDF (481.258 KB)

Abstract

Kajian ini bertujuan untuk membuat analisa dan perancangan sistem pendukung keputusan pemilihan hidup menurut budaya karo dengan menggunakan metode analytical hierarchy process (AHP). Objek utama sistem pendukung keputusan ini adalah memberikan saran memberikan saran kepada pengguna aplikasi terhadap pasangan hidupnya sesuai dengan kriteria yang ditentukan. Hasil yang diberikan bukan paksaan dan hanya berupa saran semata. Sehingga pengguna dapat melihat hasil calon pasangan yang berdasarkan bantuan sistem pendukung keputusan ini. Hasil yang dicapai adalah terciptanya suatu aplikasi sistem pendukung keputusan yang dapat digunakan untuk memilih pasangan hidup menurut budaya karo daan sesuai dengan kriteria yang dibutuhkan. Sistem ini membantu mendukung proses pengambilan keputusan untuk pemilihan pasangan. Kata kunci : Sistem, keputusan, pemilihan pasangan, Analytical Hierarchy Process (AHP) 

IMPLEMENTASI APRIORI PADA DATA KECELAKAAN LALU LINTAS DALAM PENCARIAN RELASI ANTAR VARIABEL PELAKU

Saragih, Rusmin ( STMIK KAPUTAMA BINJAI )

ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 1, No 01 (2017): November 2017
Publisher : ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA

Show Abstract | Original Source | Check in Google Scholar | Full PDF (1022.455 KB)

Abstract

Handling traffic accidents can be done by taking steps such as the approach of socialization and supervision of road signs and traffic. To be able to find the appropriate solutions to the prevention of information required traffic accidents that occur. By observing the relevant variables of traffic accident perpetrators, it can be obtained the criteria from the traffic accident perpetrators that are dominant from the relations of LAKA actors such as education, age and other variables. Apriori applied to data of LAKA actors from recent years to be able to obtain information relation between variator of LAKA actor so that can become reference to prevention and prevention of traffic accident. The a priori output of the laka perpetrator data provides the pattern relation information of the LAKA actor’s variable. Keywords: Data Mining, Apriori, Traffic Accident

PENGAMANAN BERKAS DOKUMEN MENGGUNAKAN FUNGSI ALGORITMA STEGANOGRAFI LSB

Gunawan, Indra, Sumarno, Sumarno, Irawan, Eka, Tambunan, Heru Satria

ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA Vol 2, No 1 (2018): April 2018
Publisher : ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA

Show Abstract | Original Source | Check in Google Scholar | Full PDF (298.573 KB)

Abstract

In the World of Information Technology computer science, data security something that is very important so that data can not be misused by some parties who have not / not have rights. In the delivery of documents documents is needed a security so that the document file can be accepted by those who have the right to receive it. It is therefore very necessary to process a document encryption / encryption file. Among the science of cryptography that can secure the document file such as LSB Steganography Algorithm (Least Significant Bit). This analysis aims to improve the security of document files by encoding a document file, then providing a password into the document file.Keywords : Encryption, Data Security, LSB Steganography, Files, Documents

Page 1 of 4 | Total Record : 33