Claim Missing Document
Check
Articles

Found 13 Documents
Search

APLIKASI SISTEM PENDUKUNG KEPUTUSAN DIAGNOSA PENYAKIT PARU-PARU DENGAN METODE FORWARD CHAINING Yunus, Mahmud; Setyowibowo, Sigit
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 2 NO. 2 TAHUN 2011
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In Indonesian lung disease have a high death. Tubercolosis (TB) world report (2006) by World Health Organization (WHO), Indonesia still the third biggest after India and China with around 539.000 cases and around 101.000 peoples die for a year. Derived from those fact it need more attention from mass society. My research can be used to decision support system which used to lung disease diagnosed, and know what kind of disease from their symptom. Decision support system use production rule method for representating knowledge about the kind of lung disease and their symptom. This inference engine use tree method and forward chaining. Result derived from this research shown that tree method and forward chaining can be used in finding lung disease from their symptom.  Key words: tree, forward chaining, lung.
PERBANDINGAN METODE-METODE EDGE DETECTION UNTUK PROSES SEGMENTASI CITRA DIGITAL Yunus, Mahmud
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 3 NO. 2 TAHUN 2012
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Edge detection (Edge detection) is executed to detect the operating margins (edges) that restricts two homogeneous image regions with different brightness levels (Pitas, 1993). A digital image edge detection is the process of looking for differences in the intensity of the states boundaries of an object (sub-images) in the entire digital image in question. Purpose of edge detection is to improve the appearance of the boundary line of an area or object in the image. The process of image edge detection is done by looking for the locations of the intensity of the pixels that discontinue with the intensity of the pixels adjacent (neighboring / neighborhood).There are several methods such as object edge detection operators are known, such as (1) Sobel, (2) Prewitt, (3) Robert, (4) Laplacian of Gaussian, (5) and Canny (6) Kiresh. Each operator has its own advantages and disadvantages in performing edge detection. By doing a combination or in the development of these operators allow to gain a better edge detection (obviously).One of the contributions of this study for science and technology is the creation of a software application that can be used as a simulation tool using edge detection operators in digital image and its various combinations in order to gain a better edge detection (obviously).Keywords: Edge detection, detection operator
PROTOKOL TCP/IP SEBAGAI SARANA DALAM PROSES TRANSFER DATA Yunus, Mahmud; As’ad, M.
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 3 NO. 1 TAHUN 2012
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The study entitled Protocol TCP / IP as a means to transfer this data, carried out in laboratory STMIK PPKIA Pradnya Paramita Malang in order to find out how the working process of the protocol TCP / IP and obtain a clear picture of how the protocol TCP / IP plays a role in communication within the users computer internet. This research is the development presented in descriptive form, which is analyzing the data transfer process is one of them by using the protocol TCP / IP. The results could determine the level of error that occurred while sending and receiving data, and can be used as a reference untu networking development. Keywords:Protocol, Protocol TCP/IP, Transfer Data
SISTEM PAKAR DIAGNOSIS MESIN PENGERING TEH DI WONOSARI MENGGUNAKAN METODE FORWARD CHAINING kiswara, Helga Ayuddya; Yunus, Mahmud; Widarti, Dinny Wahyu
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi Vol 6 No 1 Tahun 2015
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

An expert system was developed in line with the information technology . Development of an expert system is intended as aids to provide solutions in our lives .. This expert system could help technicians in getting solutions quickly and can save time . Expert systems use computer technology to integrate , manipulate and display information or characteristics . Expert systems can also help in making a better solution. With the rapid advancement in technology today, emerged an idea to implement a program of expert system application into a computer technician service quality activities . The author tries to build an application that will help to facilitate in providing solutions damage the dryer Wonosari tea in tea gardens so as to facilitate the user or technician to get a solution quickly sehinnga reduce impact damage diimbulkan by damage to the dryer. The system created is " Diagnosis Expert System Design Issues in Computer Using Visual Basic " The system uses a method and prototype tool for modeling using UML ( Unified Modeling Language ) . The system is built using PHP and MySQL for database processing use . This system is useful for diagnosing damage to the dryer tea in tea garden wonosari. Keywords: Applications, Expert Systems Diagnosis
ANALISIS PERBANDINGAN ALGORITMA LZW DAN HUFFMAN PADA KOMPRESI FILE GAMBAR BMP DAN PNG Satyapratama, Andika; Widjianto, Widjianto; Yunus, Mahmud
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi VOL 6 NO 2 TAHUN 2015
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

File compression is one of important aspect in the development of information technology. The demands of providing information in a short time with large number and size of files makes compression techniques very important. There are a lot of algorithms that have been developed for the compression of files, including: LZW algorithm and Huffman Algorithm. This study discusses the comparative analysis between the two algorithms are against compressed image file format BMP and PNG. Analysis of this study aims to provide knowledge about what is the best algorithm between both of the algorithm to compress the image file format BMP and PNG. This analysis is comparing the ratio and the estimated time of each algorithm for image file format BMP and PNG. The author uses the Java programming language to implement both LZW and Huffman algorithm, and then analyze the process and results of compression on the file format BMP and PNG. After testing and analysis of experiments the compression process, it is concluded that the compression process BMP and PNG file format, Huffman algorithm can compress files faster than LZW algorithm, but the LZW algorithm can produce better compression ratio than Huffman algorithm.
KRIPTOGRAFI DAN STEGANOGRAFI PADA CITRA TRUE COLOR DENGAN METODE BLOWFISH DAN LSB Yunus, Mahmud
DINAMIKA DOTCOM DINAMIKA DOTCOM VOL 6 NO 2 TAHUN 2015
Publisher : DINAMIKA DOTCOM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Kelemahan dari metode steganografi LSB adalah pesan rahasia yang disisipkan dapat dengan mudah diambil dengan menggunakan metode LSB pula. Sehingga perlu ada cara lain untuk mengamankan pesan rahasia agar tidak mudah dibaca atau dipahami oleh pihak yang tidak berhak. Pesan rahasia tersebut perlu disandikan (di-enkripsi) terlebih dahulu menggunakan teknik kriptografi sebelum disisipkan, agar pesan rahasia yang dimaksud tidak mudah dibaca atau dipahami oleh pihak yang tidak berhak. Salah satu algoritma kriptografi yang dapat digunakan adalah algoritma Blowfish. Algoritma Blowfish merupakan metode enkripsi dalam golongan symmetric cryptosystem, yaitu algoritma kriptografi yang menggunakan kunci (key) yang sama untuk proses enkripsi dan dekripsi pesanFokus dari penelitian ini adalah bagaimana menerapkan teknik kriptografi pesan digital menggunakan metode kombinasi Blowfish dan MD5, serta penyisipan dan pengambilan pesan terenkripsi (ciphertext) pada media citra true color 24 bit dengan teknik steganografi LSB (Least Significant Bit).Hasil akhir yang ingin dicapai dari penelitian ini adalah terciptanya sebuah aplikasi perangkat lunak yang dapat digunakan sebagai alat untuk menyebunyikan pesan terenkripsi pada LSB (Least Significant Bit) dari berkas citra digital true color 24 bit, dengan metode kriptografi Blowfish dan MD5 untuk mengamankan data dan informasi penting dari tidakan ilegal pihak yang tidak berhakBerdasarkan hasil pengujian yang telah dilakukan terhadap aplikasi perangkat lunak yang menerapkan teknik kriptografi pesan digital menggunakan metode kombinasi Blowfish dan MD5, serta penyisipan dan pengambilan pesan terenkripsi pada media citra true color 24 bit dengan teknik steganografi LSB (Least Significant Bit), diperoleh hasil; (1) enkripsi terhadap seluruh teks pesan rahasia dengan metode MD5 dan Blowfish, diperoleh tingkat keberhasilan sebesar 100% untuk menghasilkan teks pesan rahasia terenkripsi (ciphertext); (2) penyisipan dan pengambilan teks pesan rahasia terenkripsi (ciphertext) ke/dari dalam stego object berupa citra digital true color, 100% berhasil dilakukan dengan tampilan gambar yang mirip (tidak nampak perubahan yang signifikan) dengan tampilan citra digital sebelum dilakukan penyisipan, sehingga keberadan teks pesan rahasia di dalam stego object tidak mudah disadari keberadaannya oleh pihak lain; dan (3) proses dekripsi terhadap teks pesan rahasia terenkripsi yang diambil dari stego object, 100% berhasil dilakukan untuk menghasilkan kembali teks pesan rahasia asli (plaintext). Kata kunci: kriptografi, steganografi, MD5 dan Blowfish.
PERBEDAAN PENGARUH LATIHAN SQUAT JUMP DENGAN STANDING JUMPTERHADAP TINGGI LONCATAN PEMAIN BOLAVOLI PUTRA FIP UNIVERSITAS NEGERI MALANG Arifin, Wahyu Fajar; Saichudin, Saichudin; Yunus, Mahmud
Jurnal Sport Science Vol 7, No 1 (2017): Juni
Publisher : Jurnal Sport Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (28.177 KB)

Abstract

ABSTRACT :Men volleyball players of FIP State University of Malang less understanding in the application of theory and methods to form a model of exercise. The purpose of this study was to determine the effect of squat jump and standing jump exercises as a stepping up and more effective training between both. The design of this study used pretest posttest design with group selection using ordinal pairing matching. The instrument used is a vertical jump test. Based on result of data analysis, that is t count equal to 11,784> t table = 1,795 and for standing jump exercise also have influence that is t count equal to 6,862> t table = 1,795. Of both average results the squat jump exercise is better than standing jump exercise.Keyword :squat jump and standing jump exercises, jump height, volleyball
APLIKASI SMS GATEWAY PADA DATA MANAJEMEN COLLECTION PT MEGA FINANCE CABANG MALANG Khambali, Imam; Yunus, Mahmud
DINAMIKA DOTCOM DINAMIKA DOTCOM VOL 7 NO 1 TAHUN 2016
Publisher : DINAMIKA DOTCOM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

PT. Mega Finance is a business entity engaged in the field of finance industry, this company is atwo-wheeler financing company for all brands of Japanese motor manufacturer. Rapiddevelopments make PT Mega Finance intends to renovate and billing information delivery systeml be better for customers. From the analysis found that there are several ways of billing anddelivery of information on Collection Management Finance PT.MEGA require computer-basedprocess and in this section is proposed to be designed applications sms gateway on themanagement of data collection for all customers.Keywords : Application, SMS Gateway
PERBANDINGAN STRATEGI PELABELAN OBJEK PADA CITRA DIGITAL DENGAN METODE FLOOD FILLING Sujito, Sujito; Yunus, Mahmud
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi VOL 7 NO 2 Tahun 2016
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

One type of digital image processing is labeling the object to determine the number of objects in an image to be reviewed. Labeling the object in the image is the act to give a sign of the number of different objects on each object in the image. Labeling process can use the method of flooding the object region (flood filling) with an object number. The output of this research is a software application that can be used to perform simulations labeling objects in digital images by using (1) Recursive techniques; (2) approach the Depth First Search (DFS) and (3) the approach Breadth First Search (BFS). Waterfall model used for the development of such software. Based on tests performed on the entire software application can be concluded that the recursive method is the best method to label objects in a digital image, both in terms of speed and accuracy. Labeling objects using Recursive technique has an accuracy of counting the number of objects by 99%, while 68% DFS and BFS 83%. All methods have a level of accuracy that is better at recognizing all areas / regions of the object, but to the image of the complex and in large numbers, algorithms Stack (approach DFS) or Queue (approach BFS) has a weakness, namely (1) to repeat the numbers the same label for different objects and (2) the number of labels sometimes inconsistent for the same object.Keywords: image processing,  recursive techniques, depth first search, breadth first search
IMPLEMENTASI ALGORITMA ADJACENCY LIST MODEL PADA HIERARCHICAL DATA STRUCTURE UNTUK DINAMISASI LAYANAN STIMATA M-ACADEMIK Yunus, Mahmud
Jurnal Ilmiah Teknologi Informasi Asia Vol 2 No 2 (2008): Volume 2 Nomor 2 (5)
Publisher : LP3M STMIK Asia Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

STIMATA Mobile-Academic (M-Academic) merupakan suatu sistem layanan informasi akademik dan kemahasiswaan berbasis SMS (Short Message Service), bagi segenap civitas akademika STMIK Pradnya Paramita Malang (STIMATA). Dikembangkannya sistem informasi berbasis SMS ini, dimaksudkan untuk dapat memberikan layanan informasi akademik secara lebih mobile, praktis dan efisien. Namun dalam implemetasinya, layanan SMS STIMATA M-Academic ini seringkali mengalami perombakan pada program aplikasi-nya. Hal ini seringkali terjadi jika ada penambahan atau pengurangan layanan informasi akademik yang disediakan. Sistem layanan yang demikian dirasa kurang praktis dan efisien. Selain itu sistem layanan ini juga belum mampu memberikan respon yang informatif, khususnya untuk struktur bahasa (syntax) SMS yang salah dan tidak sah. Oleh karena itu perlu dipikirkan cara-cara baru untuk meperbaiki kinerja dari sistem STIMATA M-Academic.Hal yang dapat dilakukan adalah (1) mengimplementasikan suatu sistem Respons by Request, dimana sistem STIMATA M-Academic yang dikembangkan harus mampu memberi jawaban dengan baik, untuk semua permintaan layanan, baik SMS yang sah dan benar, maupun SMS yang error secara syntax yang telah ditentukan; dan (2) syntax layanan pada aplikasi M-Academic yang dikembangkan harus bersifat dinamis, dimana setiap kali ada penambahan atau pengurangan jenis layanan, program aplikasi tidak perlu dirombak dan dikompilasi ulang. Pengimplementasian algoritma Adjacency List Model pada Hierarchical Data Structure, dapat dijadikan jembatan dalam mendinamiskan layanan pada sistem M-Academic di STIMATA.