Claim Missing Document
Check
Articles

Found 25 Documents
Search

APLIKASI SISTEM PENDUKUNG KEPUTUSAN DIAGNOSA PENYAKIT PARU-PARU DENGAN METODE FORWARD CHAINING Yunus, Mahmud; Setyowibowo, Sigit
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 2 NO. 2 TAHUN 2011
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In Indonesian lung disease have a high death. Tubercolosis (TB) world report (2006) by World Health Organization (WHO), Indonesia still the third biggest after India and China with around 539.000 cases and around 101.000 peoples die for a year. Derived from those fact it need more attention from mass society. My research can be used to decision support system which used to lung disease diagnosed, and know what kind of disease from their symptom. Decision support system use production rule method for representating knowledge about the kind of lung disease and their symptom. This inference engine use tree method and forward chaining. Result derived from this research shown that tree method and forward chaining can be used in finding lung disease from their symptom.  Key words: tree, forward chaining, lung.
PERBANDINGAN METODE-METODE EDGE DETECTION UNTUK PROSES SEGMENTASI CITRA DIGITAL Yunus, Mahmud
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 3 NO. 2 TAHUN 2012
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Edge detection (Edge detection) is executed to detect the operating margins (edges) that restricts two homogeneous image regions with different brightness levels (Pitas, 1993). A digital image edge detection is the process of looking for differences in the intensity of the states boundaries of an object (sub-images) in the entire digital image in question. Purpose of edge detection is to improve the appearance of the boundary line of an area or object in the image. The process of image edge detection is done by looking for the locations of the intensity of the pixels that discontinue with the intensity of the pixels adjacent (neighboring / neighborhood).There are several methods such as object edge detection operators are known, such as (1) Sobel, (2) Prewitt, (3) Robert, (4) Laplacian of Gaussian, (5) and Canny (6) Kiresh. Each operator has its own advantages and disadvantages in performing edge detection. By doing a combination or in the development of these operators allow to gain a better edge detection (obviously).One of the contributions of this study for science and technology is the creation of a software application that can be used as a simulation tool using edge detection operators in digital image and its various combinations in order to gain a better edge detection (obviously).Keywords: Edge detection, detection operator
PROTOKOL TCP/IP SEBAGAI SARANA DALAM PROSES TRANSFER DATA Yunus, Mahmud; As’ad, M.
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 3 NO. 1 TAHUN 2012
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The study entitled Protocol TCP / IP as a means to transfer this data, carried out in laboratory STMIK PPKIA Pradnya Paramita Malang in order to find out how the working process of the protocol TCP / IP and obtain a clear picture of how the protocol TCP / IP plays a role in communication within the users computer internet. This research is the development presented in descriptive form, which is analyzing the data transfer process is one of them by using the protocol TCP / IP. The results could determine the level of error that occurred while sending and receiving data, and can be used as a reference untu networking development. Keywords:Protocol, Protocol TCP/IP, Transfer Data
RANCANG BANGUN SISTEM LATIHAN SOAL DAN UJIAN TOEIC (TEST OF ENGLISH FOR INTERNATIONAL COMMUNICATION) BERBASIS WEB Putro, Okma Winarko; Yunus, Mahmud
DINAMIKA DOTCOM DINAMIKA DOTCOM VOL 4 NO 2 TAHUN 2013
Publisher : DINAMIKA DOTCOM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

TOEIC which stands for Test Of English for International Communication is one of the tests of proficiency in English that has been well-known and able to be an indicator of the participants skills in using English . In general, this test is divided into two parts , namely an understanding of testing hearing ( listening ) and reading ( reading ) where participants fill in their answers to the answer sheet of paper according to the questions that are heard on the sound and the written media.Formulation of the problem described in this research is how to build an online TOEIC exam application and web-based so as to optimize the test activities and learning through TOEIC exercises become more flexible , effective and efficient . The focus of the research is how to make the process of evaluation and assessment can be done optimally . In this case simplify performance management (administrators) to create questions , streamline time to correct answers and exam participants know the results in a rapid, precise and accurate . From the test results showed that application exercises and web -based TOEIC matter capable of processing data that has been inputted by administrators and present to the participants in accordance with the standards of performance in general . Test results can also be used to provide rapid assessment and analyze the results of the assessment scoring system.Suggestions can be submitted for the development and improvement of this web -based TOEIC test is to think about a better input mechanism to facilitate the user in the process of data input problem. Key words: TOEIC, online exam
PERBANDINGAN METODE SIMPLE QUEUES DAN QUEUES TREE UNTUK OPTIMASI MANAJEMEN BANDWIDTH JARINGAN KOMPUTER DI STMIK PPKIA PRADNYA PARAMITA MALANG Syaifuddin, Aris; Yunus, Mahmud; Sundari, Retno
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 4 NO. 2 TAHUN 2013
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This research resulted in a comparison between the Simple Queues method and Queues Tree using Mikrotik router that takes a case study in STMIK PPKIA PRADNYA PARAMITA MALANG has been tested to determine which method is the most optimal deal of bandwidth sharing on computer networks. After finding out where the most optimal method will be applied in STMIK PPKIA PRADNYA PARAMITA MALANG to maximize network performance and bandwidth sharing in place, the results of the study lead to the conclusion that it is the Simple Queues more optimal than the Queues Tree.The Internet use in massive resulting in reduced network performance with increasing network users. Way that can be taken to reduce the decrease in network performance is to perform bandwidth management. Bandwidth management is very important in setting the bandwidth allocation will be given to the user to avoid the seizure of bandwidth allocation on the network.The research method used is the Simple Queues and Queues Tree method. Both of these methods will be made to determine the results of a comparison with one of the methods Simple Queues and Queues Tree is quite optimal. Key words: Mikrotik, Simple Queues, Queues Tree, Bandwidth
PENERAPAN KONSEP DATA MINING PADA DATABASE AKADEMIK STMIK PRADNYA PARAMITA DENGAN DELPHI Yunus, Mahmud
DINAMIKA DOTCOM DINAMIKA DOTCOM VOL 1 NO 1 TAHUN 2010
Publisher : DINAMIKA DOTCOM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak STMIK Pradnya Paramita Malang, merupakan sebuah perguruan tinggi swata yang memiliki basisdata (database) akademik, yang mencatat aktivitas akademik mahasiswa seperti data biodata mahasiswa, KRS, KHS dan Transkrip Nilai. Seiring dengan pembesaran aktivitas dari waktu ke waktu, maka lebih banyak lagi data yang dihasilkan, sehingga database tersebut juga semakin bertambah besar. Keberadaan database yang besar tersebut belum memberikan manfaat lebih, hanya sekedar untuk memenuhi permintaan akan laporan-laporan rutin yang sederhana. Data mining (penambangan data) merupakan sebuah teknik yang dapat digunakan untuk mengungkap informasi tersembunyi, yang sebelumnya tidak dikenal dan berpotensi sebagai pengetahuan yang bermanfaat dari kumpulan data yang besar. Informasi tersebut dapat menjadi masukan yang sangat penting untuk pengambilan keputusan yang tepat. Bahasa pemrograman Delphi telah menggabungkan beberapa fungsi koleksi data berkinerja tinggi dalam bentuk komponen analisis, yang dikenal sebagai Decission Cube (kubus keputusan). Komponen Decision Cube menawarkan jalan pintas yang mudah untuk analisis data yang kuat dalam sebuah aplikasi. Secara singkat tulisan ini menjelaskan mengenai pemanfaatan komponen Decision Cube yang dimiliki Delphi dalam sebuah aplikasi, sebagai bentuk penerapan konsep data mining pada database akademik STMIK Pradnya Paramita Malang.Kata-kata kunci : Database, Data mining, Decision Cube, Delphi  
OTOMATISASI PEMBAHARUIAN IP PADA DOMAIN ITICMALANG.NO-IP.ORG UNTUK AKASES GATEWAY DI PT.INDONESIAN TOBACCO Rony Syafrudin, Achmad; Duty Susilo, Antonius; Yunus, Mahmud
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 4 NO. 2 TAHUN 2013
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The need for access to data across the network has now become one of the primary needs PT. Indonesian Tobacco.Purposes of data access can be realized if the company has a public IP functioned to access internal applications, vpn and cctv. The problem occurs because the public IP obtained from the internet provider is dynamic (always changing) so the impact on the configuration of the client-side gateway.the method that implemented is to change the public IP address to a fixed domain, the domain used is a domain that is free with no-ip.org with address iticmalang.no-ip.org. Configuration is configured in the router includes a domain update script and scheduler, if the public IP changes and scheduler are met then the router will request to change the IP domain domain with a public IP configured on the router Key words : mikrotic, CCTV, VPN, domain, gateway
SISTEM PAKAR DIAGNOSIS MESIN PENGERING TEH DI WONOSARI MENGGUNAKAN METODE FORWARD CHAINING kiswara, Helga Ayuddya; Yunus, Mahmud; Widarti, Dinny Wahyu
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi Vol 6 No 1 Tahun 2015
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

An expert system was developed in line with the information technology . Development of an expert system is intended as aids to provide solutions in our lives .. This expert system could help technicians in getting solutions quickly and can save time . Expert systems use computer technology to integrate , manipulate and display information or characteristics . Expert systems can also help in making a better solution. With the rapid advancement in technology today, emerged an idea to implement a program of expert system application into a computer technician service quality activities . The author tries to build an application that will help to facilitate in providing solutions damage the dryer Wonosari tea in tea gardens so as to facilitate the user or technician to get a solution quickly sehinnga reduce impact damage diimbulkan by damage to the dryer. The system created is " Diagnosis Expert System Design Issues in Computer Using Visual Basic " The system uses a method and prototype tool for modeling using UML ( Unified Modeling Language ) . The system is built using PHP and MySQL for database processing use . This system is useful for diagnosing damage to the dryer tea in tea garden wonosari. Keywords: Applications, Expert Systems Diagnosis
KRIPTOGRAFI DAN STEGANOGRAFI PADA CITRA TRUE COLOR DENGAN METODE BLOWFISH DAN LSB Yunus, Mahmud
DINAMIKA DOTCOM DINAMIKA DOTCOM VOL 6 NO 2 TAHUN 2015
Publisher : DINAMIKA DOTCOM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Kelemahan dari metode steganografi LSB adalah pesan rahasia yang disisipkan dapat dengan mudah diambil dengan menggunakan metode LSB pula. Sehingga perlu ada cara lain untuk mengamankan pesan rahasia agar tidak mudah dibaca atau dipahami oleh pihak yang tidak berhak. Pesan rahasia tersebut perlu disandikan (di-enkripsi) terlebih dahulu menggunakan teknik kriptografi sebelum disisipkan, agar pesan rahasia yang dimaksud tidak mudah dibaca atau dipahami oleh pihak yang tidak berhak. Salah satu algoritma kriptografi yang dapat digunakan adalah algoritma Blowfish. Algoritma Blowfish merupakan metode enkripsi dalam golongan symmetric cryptosystem, yaitu algoritma kriptografi yang menggunakan kunci (key) yang sama untuk proses enkripsi dan dekripsi pesanFokus dari penelitian ini adalah bagaimana menerapkan teknik kriptografi pesan digital menggunakan metode kombinasi Blowfish dan MD5, serta penyisipan dan pengambilan pesan terenkripsi (ciphertext) pada media citra true color 24 bit dengan teknik steganografi LSB (Least Significant Bit).Hasil akhir yang ingin dicapai dari penelitian ini adalah terciptanya sebuah aplikasi perangkat lunak yang dapat digunakan sebagai alat untuk menyebunyikan pesan terenkripsi pada LSB (Least Significant Bit) dari berkas citra digital true color 24 bit, dengan metode kriptografi Blowfish dan MD5 untuk mengamankan data dan informasi penting dari tidakan ilegal pihak yang tidak berhakBerdasarkan hasil pengujian yang telah dilakukan terhadap aplikasi perangkat lunak yang menerapkan teknik kriptografi pesan digital menggunakan metode kombinasi Blowfish dan MD5, serta penyisipan dan pengambilan pesan terenkripsi pada media citra true color 24 bit dengan teknik steganografi LSB (Least Significant Bit), diperoleh hasil; (1) enkripsi terhadap seluruh teks pesan rahasia dengan metode MD5 dan Blowfish, diperoleh tingkat keberhasilan sebesar 100% untuk menghasilkan teks pesan rahasia terenkripsi (ciphertext); (2) penyisipan dan pengambilan teks pesan rahasia terenkripsi (ciphertext) ke/dari dalam stego object berupa citra digital true color, 100% berhasil dilakukan dengan tampilan gambar yang mirip (tidak nampak perubahan yang signifikan) dengan tampilan citra digital sebelum dilakukan penyisipan, sehingga keberadan teks pesan rahasia di dalam stego object tidak mudah disadari keberadaannya oleh pihak lain; dan (3) proses dekripsi terhadap teks pesan rahasia terenkripsi yang diambil dari stego object, 100% berhasil dilakukan untuk menghasilkan kembali teks pesan rahasia asli (plaintext). Kata kunci: kriptografi, steganografi, MD5 dan Blowfish.
ANALISIS PERBANDINGAN ALGORITMA LZW DAN HUFFMAN PADA KOMPRESI FILE GAMBAR BMP DAN PNG Satyapratama, Andika; Widjianto, Widjianto; Yunus, Mahmud
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi VOL 6 NO 2 TAHUN 2015
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

File compression is one of important aspect in the development of information technology. The demands of providing information in a short time with large number and size of files makes compression techniques very important. There are a lot of algorithms that have been developed for the compression of files, including: LZW algorithm and Huffman Algorithm. This study discusses the comparative analysis between the two algorithms are against compressed image file format BMP and PNG. Analysis of this study aims to provide knowledge about what is the best algorithm between both of the algorithm to compress the image file format BMP and PNG. This analysis is comparing the ratio and the estimated time of each algorithm for image file format BMP and PNG. The author uses the Java programming language to implement both LZW and Huffman algorithm, and then analyze the process and results of compression on the file format BMP and PNG. After testing and analysis of experiments the compression process, it is concluded that the compression process BMP and PNG file format, Huffman algorithm can compress files faster than LZW algorithm, but the LZW algorithm can produce better compression ratio than Huffman algorithm.