Claim Missing Document
Check
Articles

Found 19 Documents
Search

Penerapan Metode Dempster Shafer Dalam Mendeteksi Kerusakan Mesin Air Berbasis Android Afrilia, Yolanda; Sembiring, Abdul Sani; Hutabarat, Hukendik
JURIKOM (Jurnal Riset Komputer) Vol 5, No 2 (2018): April 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (400.294 KB) | DOI: 10.30865/jurikom.v5i2.666

Abstract

Many people do not understand the water damage, so tend to use the technician regardless of the damage. What's more to the present day many people do things quickly and accurately? Treatments that would be done alone without having to come to the service is very helpful at all for everyday life. The expert system is one of the artificial intelligence systems that contain the knowledge and experience that one expert puts into one particular area each person can use to solve a specific problem. In this case, water span range occurs in daily life. In this thesis will be discussed on how to find damage to the water machine by applying the Dempster-Shafer method. This method is used to search for evidence based on belief functions and plausible reasoning used by combining separate information (evidence) pottery to calculate the possibility of a malfunction.
Perancangan Aplikasi Keamanan Data Dengan Kombinasi Algoritma Kriptografi RC4 Dan One Time Pad Anas, Irfan; Ginting, Guidio Leonarde; Ndruru, Eferoni; Sembiring, Abdul Sani; Zebua, Taronisokhi
JURIKOM (Jurnal Riset Komputer) Vol 8, No 1 (2021): Februari 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v7i5.2541

Abstract

Data is an important aspect that has important information in it, which includes numbers, characters, symbols, pictures, sounds, or other signs that can be used as information. Data are certain facts, thus producing information. Cryptography is often used to secure and encode text data, messages, or other information, so using cryptographic algorithms on text data is able to secure data that is very important to everyone. So the expected results from the RC4 Cryptography algorithm and One Time Pad, which are used in text data can help in securing or encoding very important text data, so that the text is not easy to read or know the original message.
Determination Of Budi Darma University Ordering Patterns Needs With Apriory Algorithm Hery Sunandar; Abdul Sani Sembiring
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (914.954 KB)

Abstract

In a university, office stationery is needed to support the teaching and learning process, one of which is paper, markers, ink and so on. In determining the right strategy in terms of purchasing stationery, an effective analysis is needed, to reduce excessive spending. One way that can be done to order stationery is to use data mining techniques. The data mining technique used in this case is to use the Apriori algorithm. The a priori algorithm is one of the classical data mining algorithms. The a priori algorithm is used so that computers can learn association rules, look for patterns of relationships between one or more items in a dataset. This research was conducted by observing several research variables that are often considered by universities in ordering office stationery. (ATK). The results of this study are in the form of interesting patterns of data mining results which are important information to support ordering stationery
Penerapan Metode Preference Rangking Organization Methof for Encrichment Evaluation (PROMETHEE II) Dalam Penyeleksian Penyiar Radio Emi Safitri; Abdul Sani Sembiring; Suginam Suginam
Jurnal Sistem Komputer dan Informatika (JSON) Vol 3, No 1 (2021): September 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v3i1.2629

Abstract

One of the media that presents information quickly and is supported by high technology, one of which is radio. Radio as the oldest and most familiar communication media tool in the world continues to survive amidst many new media such as the internet. Radio up to now is still believed to be an information and communication media tool favored by many people because it has an important role in disseminating information about information about education, entertainment or other advertisements and events. To convey this information needed Human Resources (HR) is needed, namely broadcasters. In selecting the radio broadcaster must meet the requirements or criteria, so that they are chosen to be broadcasters. One solution to these problems is right by using a Decision Support System (SPK). Decision Support System (SPK) can help radio stations in making decisions on the selection of good radio broadcasters and increasing the efficiency of the decision. The promethee II method is one of the Multi Criteria Decision Making (MCDM) methods which means that it determines or sequences in a multicriteria analysis, this method is known because the concept is efficient and simple, in addition to solving problems related to multicriteria, others.
Penerapan Algoritma CAST-128 pada Proses Enkripsi dan Dekripsi Teks Yessi Sriani Barus; Abdul Sani Sembiring
JUKI : Jurnal Komputer dan Informatika Vol. 2 No. 1 (2020): JUKI : Jurnal Komputer dan Informatika, Edisi Mei 2020
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53842/juki.v2i1.25

Abstract

Encoding was first made using a classic algorithm. This algorithm builds its security on the confidentiality of the algorithm used. However, this algorithm is inefficient when used to communicate with many people because the algorithm is still very simple and still very easy to solve, so important information or data that you want to keep secret can be easily discovered by other people or people who are not responsible. CAST-128 is a cryptographic algorithm that is said to be similar to the DES algorithm which uses 16 rounds of feistel network as one of its strengths. Where in the process of encryption and decryption of text CAST-128 uses a 64-bit block length and key lengths of up to 128 bits. For information, the CAST-128 algorithm is referred to as one of the strong cryptographic algorithms against various types of cryptanalysis, including differential and linear attacks. With the application of the CAST-128 algorithm in the process of encrypting and decrypting text, it will be more difficult to decode text encoded by people who do not know the key so as to create more security than the encoded text. So when the text wants to be sent or transferred to the flashdisk will be more confidential.
Pemanfaatan Aplikasi Catatan Keuangan Harian Dalam Pengelolaan Keuangan Keluarga Abdul Sani Sembiring
Jurnal ABDIMAS Budi Darma Vol 2, No 1 (2021): Agustus 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (255.632 KB) | DOI: 10.30865/pengabdian.v2i1.3251

Abstract

Sebagai unit terkecil dari Masyarakat yaitu keluarga kurang memikirkan rekapitulasi dari pemasukan dan pengeluaran di dalam keluarga. Penerapan aplikasi dalam mengelola keuangan keluarga dianggap masih sangat rumit dan kurang bermanfaat dibandingkan dengan catatan keuangan keluarga bersifat manual. Tidak memahami cara mengelola keuangan menjadi salah satu sumber masalah yang paling besar pada keluarga. Dimana secara umum pendapatan dan pengeluaran di dalam keluarga yang jumlahnya besar saja yang diingat tetapi tidak tercatat. Mengelola keuangan keluarga merupakan hal penting agar pendapatan dan pengeluaran dapat seimbang sesuai dengan yang diinginkan. Dengan adanya aplikasi catatan keuangan harian, di dalam sebuah keluarga diharapkan dapat membantu dalam mengelola keuangan sehingga dapat tercatat secara detailKata Kunci: Manfaat, Aplikasi, Catatan Keuangan Keluarga, Keuangan, Keluarga
Pemanfaatan Aplikasi Meeting Daring Zoom Pada Anak Sekolah Di Perumahan Griya Duren Tuntungan Abdul Sani Sembiring
Jurnal ABDIMAS Budi Darma Vol 2, No 2 (2022): Februari 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (567.789 KB) | DOI: 10.30865/pengabdian.v2i2.3850

Abstract

One of the effects of Covid-19 that has attacked Indonesia, especially in the field of education, is that it requires learning to be carried out using distance learning media. One of these distance learning media is the Zoom online meeting application. Many school children do not understand how to use the features provided in the Zoom application. The provision of information on the use of the features that exist in the zoom is still considered very lacking for school children in general, considering that these school children cannot directly receive training on the use and utilization of the application. Zoom meet is a face-to-face conference platform where educators and students can interact directly like meeting in person in class. In this application there are many features provided and offer the easiest facilities for individuals who want to join.
Comparison of Breadth First Search (BFS) and Depth-First Search (DFS) Methods on File Search in Structure Directory Windows Sakaria Efrata Ginting; Abdul Sani Sembiring
Login : Jurnal Teknologi Komputer Vol. 13 No. 1 (2019): Login : Jurnal Teknologi Komputer, Edition June 2019
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Documents of any kind are of course stored by a certain method, with the hope that if in the future the data/documents contained in them are needed then simply searching, the desired data will be obtained quickly. However, the more documents that are stored, the search time will also increase, coupled with incorrect search results. This is due to the large number of documents that must be selected and examined for their relevance to the subject being sought. Breadth First Search (BFS) and Depth-First Search (DFS) is a technique used to search for data in a particular file in a file. With this searching technique, if you want to find one of the data from a lot of data manually, it will take a very long time, but using the Breadth First Search (BFS) and Depth-First Search (DFS) methods, the search will be more fast.
Analisis Penerapan Metode Lossy Pada Kompresi Citra Steganografi Abdul Sani Sembiring
MEANS (Media Informasi Analisa dan Sistem) Volume 3 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (726.549 KB) | DOI: 10.54367/means.v3i1.236

Abstract

The internet has become a very important part of communication development in the world. Exchange of information over the internet has many advantages compared to other communication media, especially in terms of speed. But information sent via the internet, security cannot be accounted for. Tapping on confidential information, very often occurs in this communication media. Channels used by the internet are generally not safe channels. By using the lossy compression method, compression can only be applied to images that have similarities to themselves (self similiarity) so that the size of the image gets smaller and saves storage space and accelerates the sending of the image using internet media.
Aplikasi Pencarian Informasi Pondok Pesantren Se-Indonesia Dengan Algoritma Zhu-Takaoka Berbasis Android Muhammad Hudan Adha; Abdul Sani Sembiring; Hukendik Hutabarat
Building of Informatics, Technology and Science (BITS) Vol 2 No 1 (2020): Juni 2020
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (293.819 KB) | DOI: 10.47065/bits.v2i1.135

Abstract

Islamic boarding school is a dormitory-based Islamic religious education institution. Until now, Islamic boarding schools have had the same level as junior and senior high schools. So that many of the parents want their children to go to a pesantren. However, some parents lack information from the pesantren. Such as address, activities, and so on. One way to get this information is by browsing on the internet. But that is only part of it. Because most Islamic boarding schools don't have official websites. And also for prospective Islamic boarding school graduates who want to complete their final obligations by serving at other Islamic boarding schools, it will also be difficult to find information about Islamic boarding schools, given that they are not allowed to bring electronic items to Pesantren. To overcome the above problems the author wants to design an android-based application by implementing the zhu-takaoka algorithm. Zhu-Takaoka algorithm is one string matching algorithm that can do word search with a lot of shifts with an array of 2 (two) dimensions