Claim Missing Document
Check
Articles

PENERAPAN THE EXTENDED PROMETHEE II (EXPROM II) UNTUK PENENTUAN PRODUK DISKON Silalahi, Yohanna; Mesran, Mesran; Zebua, Taronisokhi; Suginam, Suginam
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v1i1.473

Abstract

Salah satu alternatif strategi pemasaran yang dilakukan oleh Swalayan Palem Store adalah pemberian diskon atau potongan harga untuk produk-produk tertentu dalam periode waktu tertentu. Penentuan produk diskon harus dilakukan dengan pertimbangan dan perhitungan yang tepat. Kesalahan dalam penentuan produk diskon membuat swalayan kehilangan keuntungan bahkan mengalami kerugian. Salah satu solusi untuk permasalahan tersebut dengan menggunakan Sistem Pendukung Keputusan (SPK). Sistem Pedukung Keputusan (SPK) dapat membantu pimpinan swalayan dalam mengambil keputusan untuk menentukan produk diskon yang tepat dan meningkatkan efesiensi keputusan tersebut. Sistem pendukung keputusan memiliki beberapa tahapan sebelum menyelesaikan permasalahan yang ada. Tahapan-tahapan tersebut antara lain studi kelayakan, perancangan, pemilihan dan implementasi.The Extended Promethee (EXPROM II) merupakan salah satu metode penentuan urutan atau prioritas dalam analisis multikriteria. EXPROM II membandingkan alternatif yang satu dengan alternatif yang lainnya dan menghitung jarak selisih alternatif berpasangan sehingga menghasilkan output yaitu perangkingan alternatif berdasarkan nilai net flow tertinggi. Penentuan produk diskon yang tepat dan efektif memberikan dampak positif untuk swalayan karena dapat meningkatkan penjualan secara keseluruhan.
ANALISIS PERBANDINGAN KINERJA ALGORITMA FIXED LENGTH BINARY ENCODING DAN ALGORITMA ELIAS GAMMA CODE DALAM KOMPRESI FILE TEKS Pratiwi, Dian; Zebua, Taronisokhi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1623

Abstract

Now days, there are many algorithms developed for data compression, but there is no one that is good for compressing various types of files because of different characteristics or file structures. This research explained the result of two compression algorithms in order to know the performance comparison between the Fixed Length Binary Encoding (FLBE) algorithm and the elias gamma code algorithm in compressing text files, especially in format rtf. The parameters being compared are the ratio of compression, compression ratio, redundancy and time. Based on the test results show that the fixed length binary encoding algorithm is better than the elias gamma code algorithm where the average ratio of compression results of fixed length binary encoding algorithm is 1.66 bits while the elias gamma code is 1.62 bits. The average compression ratio of fixed length binary encoding algorithm is 60.9% while Elias Gamma Code is 62.20%. The average value of the redundancy of the fixed length binary encoding algorithm is 39.1% while the gamma code elias is 37.79%. The average time compression value of the fixed length binary encoding algorithm is 16 ms while the elias gamma code is 21 ms.Keywords: comparison, compression, FLBE algorithm, Elias Gamma Code Algorithm, text, rtf
IMPLEMENTASI ALGORITMA CHUA CHAOTIC NOISE PADA ENKRIPSI CITRA RGB Lubis, Utami Rahma Sari; Mesran, Mesran; Zebua, Taronisokhi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v1i1.501

Abstract

Now this information technology users using computers as his media greatly increased .An effective security of a system was technology information is really needed to day-to-day activities , the issue of security and secrecy is one of the important aspect of a message , data , or information. One of them is image , image is one part of the department of multimedia of what is important. The image of presenting information visually and information presented by an image richer than served in a textual. One way to secure imagery is with the process of encryption , encryption is the process of turning plaintext into chipertext , one of the methods that could be used is an algorithm chua chaotic noise that is the algorithms that having a manner of working with each pixel count that were on the image of pictures and then do rotation pixels in vertical synchronization and horizontal based on the length of pixels of any result rotation pixel image so that encryption would come out the more random. Sensitivity his on the early can also cause to change a significant impact on his iteration. Sensitivity is very talk in cryptography that corresponded to the principle of diffusion. To the principle of this diffusion then transformation of one bit of an initial value of chaos can cause chipertext still not succeed in decryption
Perancangan Aplikasi Keamanan Data Dengan Kombinasi Algoritma Kriptografi RC4 Dan One Time Pad Anas, Irfan; Ginting, Guidio Leonarde; Ndruru, Eferoni; Sembiring, Abdul Sani; Zebua, Taronisokhi
JURIKOM (Jurnal Riset Komputer) Vol 8, No 1 (2021): Februari 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v7i5.2541

Abstract

Data is an important aspect that has important information in it, which includes numbers, characters, symbols, pictures, sounds, or other signs that can be used as information. Data are certain facts, thus producing information. Cryptography is often used to secure and encode text data, messages, or other information, so using cryptographic algorithms on text data is able to secure data that is very important to everyone. So the expected results from the RC4 Cryptography algorithm and One Time Pad, which are used in text data can help in securing or encoding very important text data, so that the text is not easy to read or know the original message.
Penerapan Algoritma Text Mining Dan TF-IDF Untuk Pengelompokan Topik Skripsi Pada Aplikasi Repository STMIK Budi Darma Sari, Herlina; Ginting, Guidio Leonarde; Zebua, Taronisokhi; Mesran, Mesran
TIN: Terapan Informatika Nusantara Vol 2 No 7 (2021): Desember 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Thesis is a scientific work that must be written by students as a requirement for the final project of education. For students who want to write a thesis, for example, students on the STMIK Budi Darma campus are required to first find a topic for the title to be submitted. The way to find thesis topic references can be done by accessing the repository application. The title of the thesis has different topics, so it takes a grouping of thesis topics. Classification or grouping of thesis titles in the repository application is very important, because with the grouping of thesis titles it will make it easier to find thesis topic information that can be used as a reference in further research. Therefore, this study aims to create a repository application that is able to group theses. This research uses three methods, namely Text Mining, TF-IDF, and cosine similarity. The thesis abstract data will be processed by Text Mining to produce sentences that represent the thesis, then weighted using TF-IDF and find the level of similarity using cosine similarity. processed. So if the percentage is only 73%.
Penerapan Algoritma Arithmetic Coding Untuk Mengkompresi Record Database Pada Aplikasi Ensiklopedia Flora Berbasis Android Tari, Ratiya; Nasution, Surya Darma; Zebua, Taronisokhi
TIN: Terapan Informatika Nusantara Vol 2 No 7 (2021): Desember 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The use of a database in an application can affect the size of the application itself. The size of the database is influenced by the number of database records, so it requires a compression technique to compress database records in the flora encyclopedia application. Completion is done to reduce or reduce the size of a data so that the data size becomes smaller and with compression makes it easier to transmit. Many algorithms are developed in the compression process, one of which is the arithmetic coding algorithm. Performance measurement of compression results by applying the arithmetic coding algorithm in compressing the flora encyclopedia application database records, namely producing Ratio of compression (2.2), Compression Ratio (45%), and Redundancy (55%).
Pengamanan Citra Digital Berdasarkan Modifikasi Algoritma RC4 Taronisokhi Zebua; Eferoni Ndruru
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 4, No 4: Desember 2017
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (694.928 KB) | DOI: 10.25126/jtiik.201744474

Abstract

AbstrakCitra digital yang bersifat pribadi dan rahasia sangat rentang terhadap penyadapan oleh pihak-pihak lain, terutama bila citra tersebut didistribusikan melalui internet. Tindakan penyadapan dan penyalahgunaan terhadap citra yang sifatnya rahasia tentu saja dapat merugikan pihak pemilik citra. Salah satu teknik untuk meminimalkan tindakan tersebut di atas adalah pemanfaatan teknik kriptografi. Teknik kriptografi dapat mengamankan citra digital dengan cara modifikasi nilai-nilai pixel citra sehingga citra yang dihasilkan berbeda dengan citra asli. Algoritma RC4 dapat digunakan sebagai salah satu algoritma dalam mewujudkan tujuan teknik kriptografi. Namun algoritma ini memiliki kelemahan di mana pemecahan algoritma ini dengan know plaintext attack atau know ciphertext only dapat dilakukan dengan mudah. Penelitian ini menguraikan pengamanan citra digital berdasarkan modifikasi algoritma RC4. Modifikasi yang dilakukan adalah menambahkan sebuah blok intial vector pada proses enkripsi maupun dekripsi serta melakukan pemindahan sejumlah bit pada posisi tertentu. Hasil penelitian ini adalah citra digital dengan nilai-nilai pixel yang jauh berbeda dengan nilai pixel aslinya dengan tujuan dapat mempersulit pihak lain dalam memanipulasi citra rahasia.Kata kunci: kriptografi, citra, algoritma, RC4, cipher aliran.AbstractDigital images of a private and confidential verry extend to wiretapping by other parties, especially when the image is distributed over the internet. The tapping or misuse of the confidential private image of course, harm the image owner. One technique to minimize the above measures is the utilization of cryptographic techniques. Cryptography techniques can secure digital images by modifying the image pixel values so that the resulting image is different from the original image. RC4 algorithm can be used in realizing the purpose of cryptographic technique. But this algorithm has a weakness where the solving of this algorithm with know plaintext attack or know ciphertext only can be done easily. This research describes the security of digital images based on RC4 algorithm modification. The modification is to add a initial vector block in the process of encryption and decryption and shift a number of bits in a certain position. The results of this research is a digital image with pixel values that are much different from the original pixel value to make it difficult for others in manipulating the secret image.Keywords: cryptography, image, algorithm, RC4, stream cipher.
Application of Text Message Held in Image Using Combination of Least Significant Bit Method and One Time Pad Eferoni Ndruru; Taronisokhi Zebua
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 13, No 4 (2019): October
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.46401

Abstract

Stenography and security are one of the techniques to develop art in securing data. Stenography has the most important aspect is the level of security in data hiding, which makes the third party unable to detect some information that has been secured. Usually used to hide textinformationThe (LSB) algorithm is one of the basic algorithms proposed by Arawak and Giant in 1994 to determine the frequent item set for Boolean association rules. A priory algorithm includes the type of association rules in data mining. The rule that states associations between attributes are often called affinity analysis or market basket analysis. OTP can be widely used in business. With the knowledge of text message, concealment techniques will make it easier for companies to know the number of frequencies of sales data, making it easier for companies to take an appropriate transaction action. The results of this study, hide the text message on the image (image) by using a combination of LSB and Otp methods.
Encoding the Record Database of Computer Based Test Exam Based on Spritz Algorithm Taronisokhi Zebua
Lontar Komputer : Jurnal Ilmiah Teknologi Informasi Vol. 9, No. 1 April 2018
Publisher : Institute for Research and Community Services, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (407.233 KB) | DOI: 10.24843/LKJITI.2018.v09.i01.p06

Abstract

Computer utilization in the execution of the computer-based test is currently no strange. Almost all government agencies and companies at the time of conducting the test acceptance of new employees have been using computer-based test system online or often referred to as Computer Based Test (CBT). One of the important aspects to be considered and must be maintained in the execution of computer-based exams is the problem of question security and exam answers to abuse actions. One technique that can be done to solve the problems above is the use of cryptographic techniques. This research describes the use of spritz algorithm which is one of the cryptographic algorithms to encode the text database record of the computer-based test. The results of the encoding process can make it harder for the attackers to know the original text of the exam, so as to minimize the abuse of the exam.
Implementasi Algoritma Camellia Pada Penyandian Record Database Neti Rusri Yanti; Taronisokhi Zebua
Journal of Computer System and Informatics (JoSYC) Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Database records in the form of text are very widely used, so it is very vulnerable to data theft by unauthorized parties. In order to maintain the security of database records, it can be done by using cryptographic techniques. Cryptographic techniques can encode database records by encrypting them in the form of passwords that are not understood. The Camellia algorithm is one algorithm that can be relied upon to realize cryptographic techniques. This symmetry algorithm will produce a higher level of security against the database record because it can encode it into a password with a fairly complex process that will make it difficult for cryptanalysts to access the database. This research will use the 128 bit Camellia algorithm for the encryption and decryption process, so that in the process it is necessary to go through several long steps in order to produce the final cipher. This algorithm requires 18 rounds where every six rounds must enter Function F and Function FL-1 and also require as many as 26 subkeys, namely kw, k and kl. This study describes the process of securing a database record by encoding it based on the Camellia algorithm, so that it produces a text record database in the form of a password that is difficult for others to understand and understand. This is done in an effort to minimize acts of misuse of database records.