Claim Missing Document
Check
Articles

Found 15 Documents
Search

Sistem Pendukung Keputusan Pemilihan Konten Lokal Terbaik Menerapkan Metode Moosra (Studi Kasus: Komisi Penyiaran Indonesia) Divya Febrina; Imam Saputra
Journal of Computer System and Informatics (JoSYC) Vol 2 No 3 (2021): Mei 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Decision support system as a computer-based system consisting of components including language system components, knowledge system components and problem processing system components that interact with one another, which helps decision making through the use of data and decision models to solve semi-structured and unstructured problems. This study uses the Moosra Method in Selecting the Best Local Content based on criteria by using a formula which results are more accurate and right on target. In it also all data are combined into one with the weight of the assessment that has been obtained through an assessment of the test results. The research conducted is to create a system that can provide consideration in making decisions for the selection of the best local content.
Penyusunan Perangkat Pembelajaran Berbasis Multimedia Di SMA Negeri I STM Hilir Natalia Silalahi; Imam Saputra; Putri Ramadhani
Jurnal ABDIMAS Budi Darma Vol 2, No 1 (2021): Agustus 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (204.095 KB) | DOI: 10.30865/pengabdian.v2i1.3175

Abstract

Peningkatan kualitas pendidikan menjadi unsur konkret yang sangat penting dalam usaha untuk meningkatkan kualitas sumber daya manusia. Untuk meningkatkan kualitas tersebut maka yang perlu di perhatikan adalah masalah prestasi belajar dari siswa. Banyak faktor yang menyebabkan siswa ataupun peserta didik gagal dalam hal akademis, salah satu faktor adalah sistem pendidikan yang kurang maju dan kurang modern. Pada SMA Negeri I STM Hilir memiliki laboratorium komputer yang telah dilengkapi dengan koneksi internet. Dalam laboratorium tersebut juga dilengkapi dengan screen projector dan proyektor sehingga dapat dimanfaatkan untuk menampilkan materi-materi pelajaran menggunakan slide presentasi untuk lebih mudah memberikan simulasi materi pelajaran yang disampaikan oleh guru. Namun kendala yang dihadapi adalah keterbatasan guru dalam mempersiapkan materi pada slide presentasi membuat slide presentasi yang di tampilkan kurang menarik dan membuat siswa kurang berminat untuk memperhatikan materi yang diajarkan. Dengan melihat permasalahan yang dihadapi oleh para guru di SMA N 1 STM Hilir maka perlu dilakukan pelatihan kepada para guru untuk memanfaatkan perangkat pembelajaran berbasis multimedia dengan semaksimal mungkin sehingga dapat meningkatkan minat belajar dari para siswa. Sehingga berdampak pada meningkatnya pemahaman siswa terhadap materi pelajaran yang disampaikan.
Implementasi Metode Convolutional Neural Network Untuk Identifikasi Pola Aksara Batak Tumiar Butar - Butar; Berto Nadeak; Imam Saputra
Bulletin of Multi-Disciplinary Science and Applied Technology Vol 1 No 2 (2022): Februari 2022
Publisher : Forum Kerja Sama Penddikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (257.571 KB)

Abstract

The pattern of the Batak script is the writings of the Batak language which is an important part in the introduction of the Batak script. The Batak script consists of five major dialects, namely Angkola-Mandailing, Karo, Pakpak-Dairi, Simalungun, and Toba dialects. The writings in the Batak script, especially the Toba Batak script, are of course very difficult to understand and study by the current millennial generation. This is due to the lack of people who are experts in the field of Batak script to teach about the Batak script, especially the Toba Batak script. Convolutional neural network (CNN) is part of an artificial neural network that is used as a place to process data in two-dimensional form (multi-layer perceptron), namely sound and images or in other words as a form of pattern recognition. Convolutional neural network (CNN) is used in Batak script patterns as a tool for pattern recognition that will help recognize Batak script patterns into computer form using MatLab so that it is more effective and efficient to learn. Thus, the use of the Convolutional neural network (CNN) method in the Batak script will again bring up a sense of curiosity to learn the Batak script, especially the Toba Batak script. And also with the Convolutional Neural Network (CNN) method in Batak script, it will make the identification process easier.
Penerapan Algoritma Xtea Dengan Metode Pembangkitan Kunci Linear Congruential Generator Untuk Pengamanan Teks Rahasia Nusra Anwar; Sinar Sinurat; Imam Saputra
Resolusi : Rekayasa Teknik Informatika dan Informasi Vol. 2 No. 3 (2022): RESOLUSI Januari 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Confidential text data is very vulnerable to wiretapping by irresponsible parties. The text is still plaintext, making it easier for the attacker to make use of it. Text data can be secured by several techniques. One of them is cryptographic techniques. Cryptographic techniques can secure secret text data by randomizing the hex value of the data into a data that cannot be recognized and read. One of the reliable algorithms is the eXtended Tiny Encryption Algorithm (XTEA) symmetry algorithm. The XTEA algorithm is a simple algorithm that is lightweight and fast in the encryption and decryption process. However, the concept of the symmetry algorithm is the encryption and decryption process using the same key. The security of this concept is very vulnerable if the key is leaked and is public. So that this can be optimized by generating keys using the Linear Congruential Generator (LCG) method. Key generation is used with prime numbers. The key sent to an eligible recipient is only the initial prime number. So that the recipient has to do key assembly first to carry out the decryption process. This can optimize the encrypted ciphertext using the XTEA algorithm.
Peningkatan Kualitas Citra Termal Menggunakan Metode Blind Deconvolution Mita Erlida Sipahutar; Sinar Sinurat; Imam Saputra
Building of Informatics, Technology and Science (BITS) Vol 3 No 2 (2021): September 2021
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (425.579 KB) | DOI: 10.47065/bits.v3i2.133

Abstract

Temperature is a quantity that indicates the degree of heat of an object. The higher the temperature of an object, the hotter the object. Thermal imagery is an image created with thermal infrared spectrum that utilizes the temperature of an object. Sensing on this spectrum is based on differences in the temperature of the object and its emission power in the image which is reflected by the difference in hue or color. The sensor used in thermal images is noncamera based on scanning. In thermal imagery, there is a problem, namely blurred / blurred images that make it difficult to obtain information about objects. Blurred thermal images are caused by hot spots or rising temperatures. Thermal images often experience problems due to the large amount of diffraction fog in thermal imaging caused by the refractive index decreases as the wavelength increases. Blind deconvolution is a method that can be used to restore images that experience blur effects without having to know the value of the Point Spread Function (PSF). The process of improving the quality of thermal images is carried out using the blind deconvolution method which consists of 3 stages, namely finding the kernel value, looking for the convolution and estimation values ( ). Blind deconvolution method can be applied in improving the quality of thermal images by reducing the blur effect found in the image
Identifikasi Jenis Buah Berdasarkan Biji Dengan Menerapkan Menerapkan Metode Viola Jones Dessy Aina Sari; Nelly Astuti Hasibuan; Imam Saputra
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 4, No 1 (2020): The Liberty of Thinking and Innovation
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v4i1.2653

Abstract

The era of technology that is increasingly developing nowadays has an influence on knowledge, one of which is the introduction or identification. The identifier is a stage in the development of an identification system with image processing and detection. In the introduction of fruit seeds, there are some people or lay people who find it difficult to distinguish the types of fruit based on the seeds of the fruit because there are several fruits that have seeds that are almost the same shape and color, so there may be errors in determining the type of fruit. To find out the type of fruit based on the seeds, he identified the seeds. This identification is done to classify in order to know the results of these types of fruit by applying the Viola Jones method which can help in identifying because the Viola Jones method is an algorithm that can detect objects in the image. In this method there are several concepts that are combined into a method so that it can detect and detect an object of the seed made. The Viola Jones method uses the Haar feature as a descriptor, then combines Integral Image and AdaBoost to find and select values and objects and form a Cascade Classifier that will be used as a detector. This identifier is useful for the community to be able to recognize or know the type of fruit through the seeds.Keywords: Image, Contraharmonic Mean Filter, Noise Reduction.
Middle Square Method Analysis of Number Pseudorandom Process Arif Budiman; Efori Bulolo; Imam Saputra
The IJICS (International Journal of Informatics and Computer Science) Vol 4, No 2 (2020): September 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (352.086 KB) | DOI: 10.30865/ijics.v4i2.1386

Abstract

Random numbers can be generated from a calculation of mathematical formulas. Such random numbers are often referred to as pseudo random numbers, random numbers are used for various algorithms, especially cryptographic algorithms such as AES, RSA, IDEA, GOST that require the use of Middle-Square Method random numbers which is very useful for adding research references to algorithms concerning random number generator and better understand how random numbers are generated using the Middle-Square Method algorithm. Both data collection and report making as for the objectives achieved in the form of understanding random numbers and knowing the algorithm process, compile a program designed to be used as an alternative to random numbers for various purposes, especially in cryptographic algorithms.
Implementasi Algoritma Soundex Pada Sistem Pencarian Radio Internasional Tri Handa Mirza; Berto Nadeak; Siti Nurhabibah Hutagalung; Surya Darma Nasution; Imam Saputra
JURIKOM (Jurnal Riset Komputer) Vol 8, No 1 (2021): Februari 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v7i4.2278

Abstract

Many media are used to find sources of information needed, one of which is the radio which has been favored by many people for the means of getting information and entertainment. Radio is able to maintain its existence until the present technological era because of the ease of getting information and how to use it which is not difficult. The development of technology makes the demand for more information and radio broadcasts continue to increase, both National and International. The need to get an International Radio broadcast encourages the writer to present a solution so that a complete list of International Radio broadcasts with their frequency can be found quickly with the Implementation of the Soundex Algorithm. Soundex method is a search method based on the criteria of words or sentences that are entered and adjusted to the parameters of the existing information if the words or sentences are within the parameters that have been adjusted, the application of the Soundex algorithm will be used to find information more quickly
Sistem Pendukung Keputusan Aplikasi Nobar Online Terbaik Dengan Menerapkan Metode EDAS Dengan Pembobotan ROC Serta Kurniawan Zega; Amran Saleh Harahap; Helfrida Hormaria Sihite; Imam Saputra
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 6, No 1 (2022): Challenge and Opportunity For Z Generation in Metaverse Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v6i1.5774

Abstract

The online Nobar application is an application that provides various kinds of films or videos that are made to provide practicality for users to do online Nobar. The online Nobar application has been widely circulated on Google Playstore so that it allows users to do online Nobar wherever and whenever, so in this case a Decision Support System (SPK) is needed in determining the online Nobar application which must be recommended by the general public. In determining it there are several alternatives and criteria including user reviews, genres, users, ratings, paid videos. A decision support system is needed in determining the appropriate online nobar application to be recommended istance from average solution) method producing the best preferences according to data such as alternatives and criteria which has been determined and the best preference value in the 3rd Alternative, namely Viu as the best application for Nobar Online with a value of 0.3265with a combination of the ROC (Rank order Centroid) method and generating weight values for certain criteria and the EDAS (d.
Implementasi Teknik Enkripsi Q-Chiper Pada Keamanan Data Transkrip Nilai Siswa Khairun Nathassa; Imam Saputra; Rivalri Kristianto Hondro
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 6, No 1 (2022): Challenge and Opportunity For Z Generation in Metaverse Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v6i1.5777

Abstract

Value transcripts often occur when very important data is still done manually because it still has weaknesses, so the value transcripts are easily copied and printed by irresponsible parties, resulting in the application of incorrect values or transcripts or value transcripts whose contents have been engineered. If users do not use a good security system, they will be exposed to security attacks by using the wrong encryption.One of the solutions to the above problems is to encode the transcript data so that its confidentiality can be protected. One of the algorithms that can be applied is the Q-cipher algorithm. By applying the Q-chiper algorithm, the transcript data can be protected from irresponsible parties and can run well and the transcript data can only be accessed by users who have access rights to process the value transcript data.