Claim Missing Document
Check
Articles

Found 21 Documents
Search

File Hiding Application On Digital Images With Five Modulus Method Roby Alfian; Arpan; Sri Wahyuni
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (975.569 KB)

Abstract

Steganography is an art and study of invisible communication from confidential data on a multimedia carrier such as image, audio and video files. The most popular steganography method is the LSB (Least Significant Bit) method. However, the LSB method is very vulnerable to attack using basic image processing operations. In 2013, Jassim applied the Five Modulus method in the steganography process. The Five Modulus method will solve a digital image into a set of image subblocks called n x n sizes. Secret messages will be inserted in the window. According to Jassim, the smaller the window size, the more secret messages can be inserted into the image. The resulting steganography software can hide confidential data into a digital image. Secret data stored in the stego image can be extracted out in the extraction process
Design web-based Aplikasi Sistem Informasi Keuangan (ASIK) at Perwakilan BPKP Provinsi Riau Ziddo Simanjuntak; Zulfahmi Syahputra; Arpan
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1241.657 KB)

Abstract

In Perwakilan BPKP Provinsi Riau, before official work travel, the officer needs to prepare some documents such as Assignment Letter and Cost Sheet, while the Administrator should make Official Work Travel Letter and Treasurer Accountability Report. To make all the documents the officer has to use other work unit application, and it needs some prodecures to be done that makes the process ineffective and inefficient. Other than that there is no application to monitor the budget yet. So we create a web based application that called Aplikasi Sistem Informasi Keuangan (ASIK) which use waterfall method. Result of the research is documents that needed in official travel can be made faster with ASIK so performance of every officer can be more effective and efficient. Also, with ASIK, leader and administrator can monitor the budget easily.
Application of Fuzzy Logic in Motorcycle Security Systems Based on Internet of Things (IoT) Zulfahmi Syahputra; Arpan; Mohammad Faiza Zachary
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (976.159 KB)

Abstract

The development of motorcycle use in Indonesia is increasing every year. This increasing trend is also accompanied by the increasing number of theft crimes of motorcycles. This is due to the physical nature of the motorcycle which is relatively small and easy to steal. In this study the author will discuss the motorcycle theft prevention system by installing various sensors built using fuzzy logic and utilizing the concept of the Internet of Things (IOT). This fuzzy logic consists of values and domains that are classified into several variables to conclude the degree and status of the motorcycle as an alarm trigger. Then by utilizing IOT the alarm is converted into a notification that will be sent via the motorcycle user's Telegram application if the motorcycle is stationary, Bergerak or moved. This system has 2 (two) components, namely hardware in the form of several sensors including infrared sensors along with a microcontroller and software connected to the Telegram application which functions as a motorcycle status notification receiver.
Decision Tree Algorithm and Gini Calculation for Puppies Skin Disease Diagnosis Khairun Annisa; Arpan Arpan
Jurnal Mantik Vol. 5 No. 4 (2022): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

To put it another way, an expert system is a computer system that can store and reproduce knowledge in order to solve a problem. It is also possible to employ expert systems to assist a specific field with problem-solving, and the expert system serves to keep the necessary parties working together. Software or computer programs that provide guidance and assistance in specialized subjects, such as science, engineering, mathematics, medicine, and education can be referred to as expert systems. The expert system can be used to perform diagnostics on pets. This article aims to discuss the implementation and study of an expert system that assists users in determining the ailment that pets, particularly dogs, are suffering from. The system can generate a symptom diagnostic of a skin illness using a decision-tree algorithm. Veterinarians provided data sets on a variety of disorders. There were 105 cases of 11 diseases and 11 symptoms in the dataset used in this study. The scikit-learn library was also used to train decision trees. Following the creation of a decision tree, a case study analysis was conducted using ten real-world examples provided by the veterinarian. Participants who own dogs received questionnaires in addition to those used for analysis. In the study, 25.8% of respondents said they strongly agreed with the expert system, and 32.3% said they agreed that the expert system helped explain the ailment their dog had. A further 80 percent of the instances provided by vets can be accurately determined by the system. When four independent tests were run, the mean system prediction was found to be 67.6 percent.
IMPLEMENTATION OF THE K-NEAREST NEIGHBOR METHOD IN KNOWING WATER QUALITY David Nico L Nainggolan; Eko Hariyanto; Arpan Arpan
INFOKUM Vol. 10 No. 02 (2022): Juni, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (255.642 KB)

Abstract

The function of classification is the process carried out in predicting a data that has a class that is still unknown, the pattern that is owned is also already regular in a classification method. K-NN is a group that has an instances-based learning system, in conducting group searches by performing the value of k objects into the test with the closest value to the value of other data. KNN uses the closest distance value to the tested dataset in carrying out the classification process. Drinking water is very important for health and is a very effective component for the health of the human body. Health is very influential on the country's economy, it is necessary to invest in water that is very beneficial for the community. This study conducted a search for accuracy of water quality with data as many as 3276 different bodies of water in order to know which water can be drunk and not drinkable. The results of the accuracy of the KNN classification model that can increase the level of accuracy better for the data used. So the research on water quality has an accuracy of 56.40% with 370 data on drinkable water. Researchers hope that accuracy can be improved again by combining the optimization of the classification model in future studies
APPLICATION OF THE TOPSIS METHOD IN SELECTION OF THE BEST SMARTPHONES AT PRICE OF ABOUT ONE MILLION Febby Sittah Gunawan; Muhammad Syahputra Novelan; Arpan
INFOKUM Vol. 10 No. 02 (2022): Juni, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (227.257 KB)

Abstract

Nowadays the use of smartphones is mandatory for every society. not only adults, even children already have smartphones. especially at the current time of the COVID-19 pandemic which requires activities to be carried out at home so that people are forced to use long-distance network technology. One of them is the use of smartphones. Smartphones of various types and capabilities will be adjusted to the price. The problem that the author raises is how to find a good smartphone at a good price with a lower economic community market so that people can carry out work activities even though social activities are distant due to the covid 19 pandemic. The author searches for smartphones with prices around one million. The method used is TOPSIS. Topsis stands for TECHNIQUE FOR OTHERS PREFERENCE BY SIMILARITY TO IDEAL SOLUTION. The method is suitable in this case. The results obtained are the best smartphones at a price of around one million.
APPLICATION OF CRT (CHINESE REMINDER THEOREM) TO SPEED UP THE PROCESS OF DATA SECURITY ON IMAGE FILES Syaufi Arbin; Arpan; Eko Hariyanto
INFOKUM Vol. 10 No. 02 (2022): Juni, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (363.322 KB)

Abstract

The purpose of this study is to use the Chinese Remainder Theorem approach to create a data security application system and to improve the data security of a confidential file, particularly data that uses image files. Observation and literature review were employed in this study to acquire data. The traditional approach is used to share data, in this case a secret message in the form of text. The embedding process and the extraction process are the two fundamental procedures in message insertion utilizing the Least Significant Bit approach. The Least Significant Bit steganography technique was used to replace the secret message bits in the final bit of each color component of the image pixels, according to the results. So that the image size does not change, only one message bit (value 0 or 1) is placed into one color component of the image. Furthermore, the processing time is affected by the size of the file, the length of the key, and the computer processor performance.
SMARTPHONE SALES INFORMATION SYSTEM DEVELOPMENT USING THE WATERFALL METHOD Arief Fadillah; Arpan Arpan; Rahmad Budi Utomo
INFOKUM Vol. 10 No. 03 (2022): August, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (318.973 KB)

Abstract

Mobile Sales Information System Development is a sales application for recording sales transaction processes, accessed offline using online, local networks, or computing devices such as PC (personal computer) desktops, laptops, and notebooks. I can do it. smartphone. Previously, the sales process was done manually, so the sales transaction recording process was not well documented and it was difficult to create a report, but by doing this, it is necessary to create an information system. May be resolved. The method applied to the development of mobile sales information system applications is the application of the Waterfall method. A system that analyzes functional and non-functional system requirements, database design, and table requirements in the form of entity relationship diagrams (ERD), logical record structures (LRS), and uses Unified Modeling Language (UML) diagrams. Design coding Process Framework Codeigniter 3, from black box test testing, maintenance to application development. The results of this study are applications for sales applications that support sales transaction processing, data manipulation, and rapid printing or generation of reports for the required time period based on the required month or date.
COMPARATIVE ANALYSIS OF DATA RECOVERY USING EASEUS DATA RECOVERY WIZARD AND RECUVA APPLICATIONS Ade Putra; Muhammad Donni Lesmana Siahaan; Arpan Arpan
INFOKUM Vol. 10 No. 03 (2022): August, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (249.487 KB)

Abstract

At the end of the day, the use of computers is intended for data processing in the form of text, images, videos, and data processing that can be carried out easily and quickly. Individual computer users and organizations in everyday life often work and store data on computers, but in reality, there are certain events where the results of work, in the form of document files on the computer, can be lost so that very important and much needed files are lost from the storage media in the computer. computer or laptop. In recovering lost files or documents, various software can be used, including Pandora Recovery, Recuva and EaseUS Data Recovery Wizard. In this study, what will be discussed is the recovery of lost data by comparing the use of the EaseUS Data Recovery Wizard and Recuva application
AN APPLICATIONS IN DETERMINING THE BEST REFRIGERATOR BY USING THE TOPSIS METHOD Prayogo Selamat Sholihin; Arpan; Eko Haryanto
INFOKUM Vol. 10 No. 03 (2022): August, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (439.29 KB)

Abstract

Electronics is one of the household needs where these tools are very helpful in maintaining the freshness of food or drinks, namely the refrigerator or refrigerator. At this time, many other products have electronic product brands with all their advantages. The current research chooses the best quality used refrigerators because many refrigerators can still be used. To overcome this, a decision support system is needed in determining the best refrigerator using the Technique for Order Performance by Similarity to Ideal Solution (TOPSIS) method.Because this method uses the principle that the chosen alternative (used refrigerator) must have the closest distance from the positive ideal solution and the farthest from the negative ideal solution from a geometric point of view by using Euclidean distance to determine the relative proximity of an alternative (used refrigerator) to the optimal solution so that have good calculations and make good decisions. The criteria used in the assessment are the brand of the refrigerator, the engine, the body of the refrigerator, the freezer (coolant) space, the thermostat, and the refrigerator door.