Articles

Found 22 Documents
Search

SISTEM PAKAR DIAGNOSA PENYAKIT PADA SISTEM PENCERNAAN KELINCI MENGGUNAKAN METODE FUZZY EXPERT SYSTEM Astrid, Tiffani; Zebua, Taronisokhi; Sihite, Anggiat M Hatuaon
Journal of Information System Research (JOSH) Vol 1 No 3 (2020): April 2020
Publisher : Journal of Information System Research (JOSH)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (373.667 KB)

Abstract

Diseases of the digestive system are a type of disease that often attacks rabbits. This disease is also one of the causes of death in rabbits. This is based on interviews with veterinarians who say that, if diseases of the digestive system are not given the treatment quickly and precisely it will cause death in rabbits. Most veterinarians only open practices in big cities, so it is not uncommon for rabbit breeders who are late in giving treatment to diseases of the digestive system suffered by their pet rabbits. Based on the above problems, it is necessary to create an expert system that can help rabbit keepers and veterinarians in diagnosing diseases in the digestive system of rabbits, because so far there has not been any application to deal with this. The Fuzzy Expert System method will calculate every symptom experienced by rabbits by using the inference method from mamdani. In the Mamdani method, both input and output variables are divided into one or more fuzzy sets. The end result will be done by the process of processing a fuzzy set obtained from the composition of fuzzy rules to produce output in the form of a number in the fuzzy set domain, while this process is called affirmation (defuzzification). From the results of testing the system using the visual basic 2008 program is good to use, but still needs a lot of development in applying it to the expert system
SISTEM PAKAR UNTUK MENDIAGNOSA KERUSAKAN MESIN WET AND DRY VACUM CLEANER MENGGUNAKAN METODE CERTAINTY FACTOR (STUDI KASUS: PT. ISS INDONESIA) Zega, Zulfan Anugerah; Nadeak, Berto; Zebua, Taronisokhi
JURIKOM (Jurnal Riset Komputer) Vol 5, No 2 (2018): April 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (270.193 KB) | DOI: 10.30865/jurikom.v5i2.661

Abstract

Wet and Dry Vacuum Cleaner machines are often damaged, thus slowing down the work of cleaning service operators in completing a job. The slow technician in finding the solution of damage to Wet and Dry Vacum Cleaner machine and schedule of technicians who have been determined in two times a month to check on the condition of Wet and Dry Vacum Cleaner machine in the areas become one of the causes of inhibition of the work of cleaning service operators causing the loss on the side of time efficiency and cost incurred by the company. One solution that can be given to solve the problems being faced by PT. ISS Indonesia is utilizing an expert system-based applications. Expert system application that serves as a solution of the above problems work based on Certainty Factor method built with Microsoft Visual Studio 2008 programming language integrated with MySQL database to store data that become symptom and rules needed when doing the diagnosis by the system. This research will produce the output that is if user or user of a system does the diagnosis by choosing answer given by system through consultation form hence will yield output result of diagnosis of damage in the form of confidence level and solution of damaged machine Wet and Dry Vacum Cleaner.
Application of Text Message Held in Image Using Combination of Least Significant Bit Method and One Time Pad Ndruru, Eferoni; Zebua, Taronisokhi
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 13, No 4 (2019): October
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (565.525 KB) | DOI: 10.22146/ijccs.46401

Abstract

Stenography and security are one of the techniques to develop art in securing data. Stenography has the most important aspect is the level of security in data hiding, which makes the third party unable to detect some information that has been secured. Usually used to hide textinformationThe (LSB) algorithm is one of the basic algorithms proposed by Arawak and Giant in 1994 to determine the frequent item set for Boolean association rules. A priory algorithm includes the type of association rules in data mining. The rule that states associations between attributes are often called affinity analysis or market basket analysis. OTP can be widely used in business. With the knowledge of text message, concealment techniques will make it easier for companies to know the number of frequencies of sales data, making it easier for companies to take an appropriate transaction action. The results of this study, hide the text message on the image (image) by using a combination of LSB and Otp methods.
Encoding the Record Database of Computer Based Test Exam Based on Spritz Algorithm Zebua, Taronisokhi
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 9, No. 1 April 2018
Publisher : Research institutions and Community Service, University of Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (407.233 KB) | DOI: 10.24843/LKJITI.2018.v09.i01.p06

Abstract

Computer utilization in the execution of the computer-based test is currently no strange. Almost all government agencies and companies at the time of conducting the test acceptance of new employees have been using computer-based test system online or often referred to as Computer Based Test (CBT). One of the important aspects to be considered and must be maintained in the execution of computer-based exams is the problem of question security and exam answers to abuse actions. One technique that can be done to solve the problems above is the use of cryptographic techniques. This research describes the use of spritz algorithm which is one of the cryptographic algorithms to encode the text database record of the computer-based test. The results of the encoding process can make it harder for the attackers to know the original text of the exam, so as to minimize the abuse of the exam.
SIMULASI ANTRIAN PELAYANAN PEMBAGIAN DANA PROGRAM SIMPANAN KELUARGA SEJAHTERA MENGGUNAKAN ALGORITMA FIRST COME FIRST SERVER (STUDI KASUS : PT. POS INDONESIA (PERSERO) MEDAN) Zebua, Taronisokhi; Gulo, Syukur Novertiani; Nasution, Surya Darma; Ginting, Guidio Leonarde
JURIKOM (Jurnal Riset Komputer) Vol 3, No 4 (2016): Agustus 2016
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (379.651 KB) | DOI: 10.30865/jurikom.v3i4.337

Abstract

Masalah antrian sangat sering dijumpai pada kehidupan sehari-hari. Seperti yang dihadapi oleh Kantor Pos dengan peran ganda. Selain penyedia layanan jasa antar barang, kantor pos juga berperan sebagai tempat penyalur dana program simpanan keluarga sejahtera. Analisis yang dilakukan meliputi pembentukan model antrian adalah model single queue multi server yang  memiliki satu pintu input dan satu pintu output,  simulasi antrian single queue multi server yaitu satu antrian ataupun tunggal dan mempunyai fasilitas, mempunyai banyak pelayanan dan lebih dari satu. Simulasi merupakan salah satu strategi pembelajaran yang bertujuan memberikan pengalaman belajar yang lebih kongkrit melalui tiruan-tiruan yang mendekati bentuk sebenarnya. Simulasi antrian pada algoritma first come first server menggambarkan bahwa orang yang lebih dahulu datang akan dilayani terlebih dahulu. Kalau ada proses tiba pada waktu yang sama, maka pelayanan mereka dilaksanakan melalui urutan mereka dalam antrian. Proses di antrian belakang harus menunggu sampai semua proses di depannya selesai. Antrian FCFS merupakan permasalahan yang ada terutama menyangkut kedatangan pelanggan (konsumen), permintaan pelayanan, kemudian terjadi antrian atau baris tunggu untuk memperoleh pelayanan tersebut, sehingga ada waktu tunggu. Seiring dengan kemajuan yang dicapai dengan menggunakan teknologi komputer, tahun demi tahun berkembang terus dengan pesatnya, untuk menyelesaikan masalah antrian ini dapat dipergunakan model antrian FCFS
SISTEM PENDUKUNG KEPUTUSAN PEMILIHAN PERUMAHAN DENGAN METODE SIMPLE ADDITIVE WEIGHTING (SAW) Manao, Hartika; Nadeak, Berto; Zebua, Taronisokhi
MEDIA INFORMATIKA BUDIDARMA Vol 1, No 2 (2017): Juni 2017
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.137 KB)

Abstract

Housing is a basic human need and needs to be nurtured and developed for the sake of the continuity and improvement of peoples lives and settlements that can not be seen as a means of necessity solely, but more than that is the process of human settlements in creating a space of life to socialize themselves in expressing their identity. During this time customers make housing selection based on information from others, observing housing and experience by not considering the criteria needed so often cause new problems for the customer after buying housing. Problems such as inconvenience, credit installment problems and so forth. Decision support systems are generally defined as a system capable of producing solutions and problem- solving. Decision support systems are not intended to replace decision-making roles, but to assist and support decision makers. One of the most commonly used methods in decision support systems is the simple additive weighting (SAW) method. This simple additive weighting method can determine the preference value of each alternative, then perform the warfare process that can select the best alternative from a number of alternatives available.
Pengamanan Citra Digital Berdasarkan Modifikasi Algoritma RC4 Zebua, Taronisokhi; Ndruru, Eferoni
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 4, No 4: Desember 2017
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (694.928 KB) | DOI: 10.25126/jtiik.201744474

Abstract

AbstrakCitra digital yang bersifat pribadi dan rahasia sangat rentang terhadap penyadapan oleh pihak-pihak lain, terutama bila citra tersebut didistribusikan melalui internet. Tindakan penyadapan dan penyalahgunaan terhadap citra yang sifatnya rahasia tentu saja dapat merugikan pihak pemilik citra. Salah satu teknik untuk meminimalkan tindakan tersebut di atas adalah pemanfaatan teknik kriptografi. Teknik kriptografi dapat mengamankan citra digital dengan cara modifikasi nilai-nilai pixel citra sehingga citra yang dihasilkan berbeda dengan citra asli. Algoritma RC4 dapat digunakan sebagai salah satu algoritma dalam mewujudkan tujuan teknik kriptografi. Namun algoritma ini memiliki kelemahan di mana pemecahan algoritma ini dengan know plaintext attack atau know ciphertext only dapat dilakukan dengan mudah. Penelitian ini menguraikan pengamanan citra digital berdasarkan modifikasi algoritma RC4. Modifikasi yang dilakukan adalah menambahkan sebuah blok intial vector pada proses enkripsi maupun dekripsi serta melakukan pemindahan sejumlah bit pada posisi tertentu. Hasil penelitian ini adalah citra digital dengan nilai-nilai pixel yang jauh berbeda dengan nilai pixel aslinya dengan tujuan dapat mempersulit pihak lain dalam memanipulasi citra rahasia.Kata kunci: kriptografi, citra, algoritma, RC4, cipher aliran.AbstractDigital images of a private and confidential verry extend to wiretapping by other parties, especially when the image is distributed over the internet. The tapping or misuse of the confidential private image of course, harm the image owner. One technique to minimize the above measures is the utilization of cryptographic techniques. Cryptography techniques can secure digital images by modifying the image pixel values so that the resulting image is different from the original image. RC4 algorithm can be used in realizing the purpose of cryptographic technique. But this algorithm has a weakness where the solving of this algorithm with know plaintext attack or know ciphertext only can be done easily. This research describes the security of digital images based on RC4 algorithm modification. The modification is to add a initial vector block in the process of encryption and decryption and shift a number of bits in a certain position. The results of this research is a digital image with pixel values that are much different from the original pixel value to make it difficult for others in manipulating the secret image.Keywords: cryptography, image, algorithm, RC4, stream cipher.
PERANCANGAN APLIKASI PENGACAKAN PEMENANG UNDIAN BERHADIAH MENGGUNAKAN METODE BLUM-BLUM SHUB BERBASIS ANDROID Harahap, Citono; Ginting, Garuda; Zebua, Taronisokhi
JURIKOM (Jurnal Riset Komputer) Vol 7, No 2 (2020): April 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (298.018 KB) | DOI: 10.30865/jurikom.v7i2.2112

Abstract

Lottery or commonly known as a lottery is one way to raise funds used for humanitarian projects and social activities or a way to determine the winner randomly. So, the lottery does a random gift-giving process and the lottery is synonymous with the lottery. The design of a lottery winner randomization application is one of the more modern ways and can attract many lottery participants to enter the lottery by reducing the cost of printing and distributing lottery tickets. One of them is the blum blub shub method, which is a method that functions to generate random numbers mathematically with the resulting output is a series of binary numbers. the numbers that are made as winners. The designed application only simulates the process of inputting lottery numbers and the randomization process to get the winning numbers
Optimalisasi Beaufort Cipher Menggunakan Pembangkit Kunci RC4 Dalam Penyandian SMS Diana, Mia; Zebua, Taronisokhi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 2, No 1 (2018): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (727.978 KB) | DOI: 10.30645/j-sakti.v2i1.52

Abstract

The key in the cryptography algorithm is a very important role in the process of encryption and decryption. The more random key numbers are used, the more random the ciphers are generated. The RC4 algorithm and the Beaufort cipher are algorithms of cryptographic techniques. The RC4 algorithm has advantages in generating random keys, whereas Beaufort ciphers have a disadvantage in terms of the number of keys used too much. This research describes how to optimize key formation in Beaufort algorithm by utilizing the key generation process on the RC4 algorithm which is implemented on encoding SMS which until now has not been point-to-point (not directly sent to destination). The results of this study provide convenience for users in the process of generating encryption and decryption keys and generate SMS cipher more random and difficult to understand by others.
Aplikasi Saran Buku Bacaan Bagi Pengunjung Perpustakaan AMIK STIEKOM Sumatera Utara Berdasarkan Algoritma Brute Force Zebua, Taronisokhi; Silalahi, Natalia
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 3 (2018): Edisi Juli
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (826.679 KB) | DOI: 10.30645/jurasik.v3i0.67

Abstract

Service of information about books in a library is very helpful and makes it easier for visitors to find the book they want to find. Presentation of information on books available in the library of AMIK Stiekom North Sumatra has not been effective and efficient, because it is still done by looking at the library employee records on the list of books that have been provided. This problem becomes one of the factors to decrease interest in reading the library visitors. Utilization of application suggestions reading books in the library of AMIK Stiekom North Sumatra can be used as a trigger of the interest of visitors to keep reading books available in the library. The built-in book suggestion app works based on brute-force algorithms so that it can present book information relevant to the topic being searched by the visitors.