Claim Missing Document
Check
Articles

PENERAPAN METODE ANALITICAL HIERARCHY PROCESS DALAM PENENTUAN WARGA PENERIMA PROGRAM KELUARGA HARAPAN (PKH) (Studi Kasus : Kantor Lurah Tegal Sari Mandala II) Lubis, Paulus; Nadeak, Berto; Hondro, Rivalri Kristianto
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 1, No 1 (2017): Maret 2017
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v1i1.318

Abstract

There is a term citizens of citizens and citizens. People are more a political concept. The people show to those who are under one government and the government. The terms of the last citizen or people is opposed by the ruler. So the residents of the Family Hope Program (PKH) are those surveyed based on BPS and PKC or PKH quotas also determined by the Government. One of the most important citizens in PKH recipients. Of course the choice of citizens should be done as possible. Based on the problem, the AHP method used in this research is for the determination of the citizens by considering the aspects of the determination that has been determined by the Partnership. The determining aspects that are the basis of the determination by the Kelangkahan in the determination of the residents is the Introduction Place, Information Household and Social Economic Description. By using AHP method is expected to assist the leadership of Tegal Sari Mandala II Lurah Office to conduct the process of determining the residents so that more quickly and effectively. Being a reference to research related to Governmen Keywords: Decision Support System, AHP, Program Keluarga Harapan (PHP)
Penerapan Text Mining Dengan Menggunakan Metode TF-IDF Untuk Menentukan Genre Dari Komik Saragih, Windi Sri Utami; Hasibuan, Nelly Astuti; Hondro, Rivalri Kristianto
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 4, No 1 (2020): The Liberty of Thinking and Innovation
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v4i1.2679

Abstract

Comics are literary works whose story descriptions are displayed in the form of pictures and in the story there is one character who is favored. The division of comics into genres is less effective, because the words represent inappropriate genres. Therefore we need a system that can determine the genre of a comic automatically due to the many genres of the comic. This study uses text mining and TF-IDF for the process of determining the comic genre. Text mining can be defined as the discovery of new information that was previously unknown to computers by extracting automatic information from different sources. Meanwhile, resource data is used as a reference in determining the comic genre. In this study, comics were divided into 4 categories: horror, inspirational, mystery and romantic. The text entered is in the form of title, author, and synopsis. This synopsis will be processed to produce a comic genre. The first process is the process of document preparation and document selection. Then proceed with the word weighting process using TF-IDF, then determining the genre of comics is done by comparing the similarity value between the text and a node in the resource data. The text obtained will be classified in an existing genre or node, if it has the highest similarity value in one of the nodes in the data resource. It is hoped that the system to be built is in accordance with the expectations of researchers, so that the system to be built can determine the genre of a comic.Keywords: Classification, Comic, Text Mining, Resource Data, TFIDF
PENERAPAN ALGORITMA LEVENSTEIN PADA APLIKASI KOMPRESI FILE MP3 Sari, Tetti Purnama; Nasution, Surya Darma; Hondro, Rivalri Kristianto
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 2, No 1 (2018): Peranan Teknologi dan Informasi Terhadap Peningkatan Sumber Daya Manusia di Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v2i1.946

Abstract

Compressed files require less disk space than files that are not compressed, so compressing is useful for backing up data by using storage space to be small or to send information over the Internet faster. MP3 makes the audio format often used because the data stored resembles the original data when recorded and has a size that is not too large compared to other formats. Users besides storing song files, they also store videos and other files and users also want the highest quality data and minimum quantity (size). So to make a lot of empty space and have a size of data that is not large on storage media, a compression method that means to shorten the size of the bits needed for data is needed. Algorithms used in the compression process, including the Levenstein algorithm which is a type of lossless compression. Applying the Levenstein algorithm to the compression process the author wants to know the performance of compression when done by compressing MP3 files, so that large MP3 files will be compressed into smaller sizes, so that the transmission process is carried out faster and reduces the data storage location.Keywords: MP3, File, Levenstein
IMPLEMENTASI METODE PIXEL VALUE DIFFERENCING UNTUK PENYEMBUNYIAN PESAN PADA CITRA DIGITAL Andri, Ricky; Hondro, Rivalri Kristianto; Tampubolon, Kennedi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1613

Abstract

The development of information technology is very fast, causing a lot of security holes that can be misused by people who are not responsible so that it can harm certain parties. Digital images are chosen as a container for inserting messages because digital images have sufficient size to hold the message and digital images are often used in information exchange so as not to invite suspicion from irresponsible parties. The information to be sent is hidden in a digital image, then the digital image is sent as normal data, so that third parties do not suspect that there is confidential information inside. Information that is hidden in the digital image can be extracted again by the recipient of the message. Pixel Value Differencing (PVD) works on a pair of adjacent pixel values (adjacent pixels). The advantage of the Pixel Value Differencing (PVD) method is that the capacity of the image generated to insert a message can be smaller than its original size, the processing time of this method is quite fast, after the message is inserted, the image quality has good quality. But this method also has disadvantages, because it is not resistant to manipulation.Keywords: Steganography, Digital Image, Pixel Value Differencing
MABAC: Pemilihan Penerima Bantuan Rastra Menggunakan Metode Multi-Attributive Border Approximation Area Comparison Rivalri Kristianto Hondro
JURNAL MAHAJANA INFORMASI Vol 3 No 1 (2018): JURNAL MAHAJANA INFORMASI
Publisher : Universitas Sari Mutiara Indonesia Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (372.729 KB)

Abstract

Bantuan Rastra merupakan program pemerintah yang diberikan kepada masyarakat untuk meningkatkan kesejahteraan dan ketahanan pangan dalam rumah tangga, mengatasi kemiskinan dan sekaligus memberikan perlindungan sosial kepada masyarakat yang tidak mampu. Pemilihan penerima bantuan rastra sudah menjadi tugas perangkat desa memilih siapa saja layak untuk mendapatkan bantuan rastra. Mendukung keputusan pemilihan penerima bantuan rastra yang sifatnya multi alternative maka diperlukan metode pendukung keputusan. Metode MABAC adalah salah satu metode pendukung keputusan yang jenis keputusannya multi alternative, metode ini dapat membantu proses pengambilan keputusan pemilihan bantuan rastra dengan optimal. MABAC merupakan metode perbandingan multikriteria. Metode ini dipilih karena, metode ini menyediakan stabil (konsisten) solusi dan handal untuk pengambilan keputusan rasional, dibandingkan dengan metode lain multi-kriteria pengambilan keputusan (SAW, COPRAS, Moora, TOPSIS dan VI-KOR). Menerapkan metode MABAC dalam proses pendukung keputusan pemilihan penerimaan bantuan ranstra, metode MABAC memiliki 6 langkah proses yaitu Forming initial decision matrix, Normalization of initial matrix, Calculation of weighted matrix, Determination of border approximate area matrix, Calculation of matrix elements of alternative distance from the border approximate area, Ranking alternatives. Kata Kunci: RASTRA, SPK, MABAC
PERANCANGAN APLIKASI PENYANDIAN TEKS DENGAN ALGORITMA ROT13 DAN TRIANGLE CHAIN CIPHER (TCC) Rivalri Kristianto Hondro
JURNAL MAHAJANA INFORMASI Vol 3 No 2 (2018): JURNAL MAHAJANA INFORMASI
Publisher : Universitas Sari Mutiara Indonesia Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (720.29 KB)

Abstract

Kriptografi adalah ilmu tentang menjaga kerahasiaan informasi aspek, yang dapat mengancam keamanan informasi oleh metode matematika tertentu dan teknik. Dengan berprinsip pada definisi super enkripsi yaitu, sebuah konsep enkripsi yang menggunakan kombinasi dari dua atau lebih teknik substitusi dan permutasi dari kode, untuk mendapatkan algoritma yang lebih dapat diandalkan (sulit belum terpecahkan). Proses mengirim dan menerima pesan ini sangat rentan terhadap upaya pencurian, penyadapan, pembajakan, pemerasan dan banyak hal lain untuk informasi. Karena beberapa hal di atas, Aplikasi kriptografi sangat dibutuhkan di menjaga kerahasiaan pesan. Dalam studi ini penulis akan merancang aplikasi penyandian teks menggunakan algoritma ROT13 dan sandi jaringan algoritma segitiga (TCC). Algoritma ROT13 adalah salah satu algoritma dari perkembangan pergantian Cipher Caesar algoritma. Metode ROT13 adalah metode enkripsi yang mengubah huruf ke huruf berbaring posisi 13 dari surat asli. Algoritma kriptografi segitiga jaringan Cipher adalah algoritma yang dibuat untuk memperbaiki algoritma kriptografi klasik terutama algoritma substitusi tunggal alfabet sangat rentan dengan teknik analisis frekuensi. Kekuatan cipher terletak di kunci yaitu nilai integer yang menunjukkan pergeseran karakter-karakter sesuai dengan operasi pada caesar cipher.
Modifikasi Platform Kunci Algoritma Playfair Untuk Meningkatkan Nilai Confusion Pada Ciphertext Rivalri Kristianto Hondro
Journal of Computer System and Informatics (JoSYC) Vol 1 No 2 (2020): Journal of Computer System and Informatics (JoSYC) - Februari 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (509.105 KB)

Abstract

Cryptography is the science of "original manuscript" encoding techniques, called plaintext terms, the arrangement of which is encrypted using a key so that it becomes "random text that is difficult to read" or referred to as ciphertext. By doing this process, someone who does not have a decryption key cannot read the original data. The cryptographic application technique is often also called the Algorithm or Cipher, one of the cryptographic algorithms discussed in this article is the Playfair Algorithm. Modifications are made to the key table that is owned by the Playfair Algorithm so that there are additional characters besides letters, there are numbers and symbols. The result to be achieved is from the modification of the Playfair algorithm that can be applied to the encryption process so as to produce a ciphertext that has a confusion value. but it can also be applied to the decryption process so as to produce an understandable plaintext
Sistem Pendukung Keputusan Pemilihan Jaksa Terbaik dengan Menerapkan Metode MABAC (Studi Kasus: Kejaksaan Negeri Medan) Bagus Nur Ihwa; Natalia Silalahi; Rivalri Kristianto Hondro
Journal of Computer System and Informatics (JoSYC) Vol 1 No 4 (2020): August 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The selection of the Medan District Attorney as part of the Attorney General's Office of the Republic of Indonesia carried out several mutations of the chief prosecutor who were taken by manually calculating performance scores. The criteria taken in the evaluation are orientation, service, integrity, commitment, discipline, and cooperation aspects require a decision support system (SPK) to accelerate and facilitate decision making. Decision support systems are used to help decision making in an organization to facilitate decision making. Where no one knows for sure how decisions should be made. One of the methods used in this decision support system is MABAC. Decision support system to assist local governments in the selection of the best prosecutors in accordance with specified conditions and criteria. The MABAC method is one of a set of decision support system methods that are included in the multi criteria decision making method (MABAC) group
Teknik Dasar Pengambilan dan Pengolahan Fotografi Produk Kerajinan Tangan Pada Badan Usaha Milik Desa Dagang Imam Saputra; Rivalri Kristianto Hondro; Alwin Fau
Jurnal ABDIMAS Budi Darma Vol 1, No 1 (2020): Agustus 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (112.161 KB) | DOI: 10.30865/pengabdian.v1i1.1213

Abstract

Kerawan Dagang BUMDes has long been established and has several superior products in the form of handicrafts in the form of flowers made from plastic waste. With this superior product, trading voluntary villages should be able to further develop BUMDes for the welfare of their village communities. At present, the handicraft is still placed in a shop window, so it is very limiting for people who want to see it. Some have used social media to sell these handicraft products. This has a positive impact because the reach of people who can see becomes wider. But the display of photos of the product is less attractive because it still uses makeshift cameras and does not use techniques for taking photos of products such as lighting that is less than optimal. With the dedication to the community with the theme of the Basic Technique of Taking and Processing Handicraft Product Photography at the Tanjung Morawa Cluster Business Village Ownership, it is expected to increase sales of these handicraft products.
Message Security on Chat App based on Massey Omura Algorithm Taronisokhi Zebua; Rivalri Kristianto Hondro; Eferoni Ndruru
IJISTECH (International Journal of Information System and Technology) Vol 1, No 2 (2018): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v1i2.11

Abstract

Security of message on chat apps is very important to do so that messages that distributed always safety for others who do not have access permission. However, not all chat apps currently have tools that used to secure messages. This is still often overlooked, thus providing an easy space for the attackers to hack messages that are distributed. This research explains the usage of the massey-omura algorithm to secure text type message in chat apps when message distributed