cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
mib.stmikbd@gmail.com
Editorial Address
Jalan sisingamangaraja No 338 Medan, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
JURNAL MEDIA INFORMATIKA BUDIDARMA
ISSN : 26145278     EISSN : 25488368     DOI : http://dx.doi.org/10.30865/mib.v3i1.1060
Decission Support System, Expert System, Informatics tecnique, Information System, Cryptography, Networking, Security, Computer Science, Image Processing, Artificial Inteligence, Steganography etc (related to informatics and computer science)
Articles 54 Documents
Search results for , issue "Vol 7, No 4 (2023): Oktober 2023" : 54 Documents clear
Classification of Medicinal Wild Plant Leaf Types Using a Combination of ELM and PCA Algorithms Dedy Alamsyah; Farli Rossi; Ri Sabti Septarini; Mohammad Imam Shalahudin
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 7, No 4 (2023): Oktober 2023
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v7i4.6817

Abstract

Despite their detrimental nature, it turns out that wild plants have many benefits for human health. Wild plants with a form of herbaceous vegetation contain ingredients that can be used as medicine, especially in their leaves. However, because the information is very similar and the form is similar, people don't know about it. For this reason, the aim of this research is to implement an artificial neural network algorithm using Extreme Learning Machine (ELM) and the Principal Component Analysis (PCA) algorithm to classify images of wild plant leaves with medicinal properties, especially in herbaceous vegetation. The feature extraction used in this research involves morphological features by considering the shape of the object. The PCA algorithm will reduce data complexity and identify hidden patterns in the data by changing the original feature space to a new and more concise feature space. Next, the ELM algorithm is used to recognize class grouping patterns when solving classification problems. Accuracy test results show a value of 90.667%.
Implementasi Data Mining dengan Algoritma Apriori dalam Menentukan Pola Pembelian Aksesoris Laptop Gatot Soepriyono; Agung Triayudi
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 7, No 4 (2023): Oktober 2023
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v7i4.6555

Abstract

Consumer purchasing patterns are an important factor in the business world, which influences marketing strategies, stock management and company profits. In the context of the laptop accessories business, a deep understanding of consumer purchasing patterns is very necessary to increase operational efficiency and customer satisfaction. Data mining, as a powerful data analysis method, has become an effective tool in uncovering these patterns. One of the data mining algorithms that is often used to analyze association patterns is the Apriori algorithm. This research applies the Apriori algorithm to identify and analyze purchasing patterns for laptop accessories from transaction data obtained from a retail store. By analyzing this data, we can identify items that are frequently purchased together and purchasing patterns that may not be immediately apparent to humans. The results of this analysis provide valuable insight into consumer preferences, helping retail stores to design more effective marketing strategies. The results of this research can also be used to manage stock more efficiently. By knowing deeper purchasing patterns, retail stores can predict stock needs more accurately, reduce the risk of excess inventory, and optimize operational expenses. Thus, this research can help increase company profits and satisfy customers by providing accessories that suit their preferences. In the increasingly developing information era, the use of data mining and algorithms such as Apriori is becoming increasingly important. This research is an example of how data analysis can be used in the real world to support smarter and more efficient decision making in the laptop accessories business. As a result, a better understanding of consumer behavior and purchasing patterns can provide a strong foundation for developing successful business strategies.
Peningkatan Algoritma C4.5 Berbasis PSO Pada Penyakit Kanker Payudara Rudi Nurcahyo; Ahmad Zainul Fanani; Affandy Affandy; Mochammad Ilham Aziz
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 7, No 4 (2023): Oktober 2023
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v7i4.6841

Abstract

Onenof the diseases innthe world that causes deathnin women isncancer. Cancernis a diseasencaused by uncontrolled enlargement of abnormal organs in the body. Cancer diagnosis is made using anthropometric data from routine blood analysis. The data used is the Breast Cancer Coimbra Data Set obtained from the UCI Machine Learning Repository. The C4.5 method is andecision treenalgorithm that is often used in the classification process. The selection of the right features, as well as the selectionnof the right method to overcome the class imbalance in the classification process cannimprove the performancenof the C4.5 algorithm. confusion matrix can benused in the Test to determine Classification accuracy. In this research, the application of PSO as a feature organization.
Implementasi Kontrol PID untuk Percepatan Rotasi pada Robot Hexapod Yovi Pratama; Muhammad Irwan Bustami; Afrizal Nehemia Toscany; Chindra Saputra; Xaverius Sika; Janu Hadi Susilo; Arahmad Taupiq; Cahyana Putra Pratama
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 7, No 4 (2023): Oktober 2023
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v7i4.6583

Abstract

In the development of robot technology, the hexapod robot has great potential to be used in post-disaster rescue because of its ability to adapt to difficult terrain. In this study the authors consider the effectiveness of PID (Proportional Integral Derivative) control based on related literature. Several previous studies have shown the successful use of PID in servo or robotics movement control in different contexts, such as approaching fire sources, controlling DC motor angles, controlling cleaning robot movements on glass, and so on. But the authors want to implement PID motion control with a different approach. The main objective of the hexapod robot is to save the victim by overcoming obstacles and delivering them to the safe zone. In the first test the authors use the PID control method in the middle position between the initial compass rotation value and the destination rotation. The results show that the time needed to reach the rotation goal is relatively fast. In contrast, the second test using the PID control method for all rotary motion resulted in a significant reduction in the error value compared to the first test. Although it requires more time, this method increases the robot's accuracy in achieving the rotation objective efficiently. The robot uses a CMPS03 compass sensor which can provide a direction value which will be input to the PID and servos that are installed as foot movers, each servo is controlled by a microcontroller with the inverse kinematic method to produce the appropriate movement. The results of this research are expected to be the basis for the development of more capable and reliable robots in the next Indonesian SAR robot contest.
Penerapan Metode Elimination Et Choix Traduisant la Realite (ELECTRE) dalam Proses Segmenting, Targeting, dan Positioning Layanan Akomodasi Yerik Afrianto Singgalen
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 7, No 4 (2023): Oktober 2023
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v7i4.6677

Abstract

One of the challenges in marketing marketing strategy is determining the appropriate segments and target markets and increasing competitiveness through solid positioning. To determine the STP (Segmenting, Targeting, Positioning) marketing strategy in the accommodation service business, it is necessary to support decision-support models relevant to resource availability and the market environment. This study applies the Elimination et Choix Traduisant la Realite (ELECTRE) method in segmenting, targeting, and positioning hotel, homestay, and resort accommodation services. The stages in the ELECTRE method are as follows:  the stage of determining criteria and alternatives; the stage of normalization of the decision matrix; the weighting stage of the normalization matrix; the stage of determining the set of concordance and discordance on the index; the calculation stage of the concordance and discordance matrices; the calculation stage of the dominant matrix of concordance and discordance; Determination stage aggregate dominance matrix; the stage of elimination of less favorable alternatives. Based on the results of this study, it is known that the ELECTRE method can provide a systematic decision-making structure and framework, especially in segmenting, targeting, and positioning, to optimize results by business goals. Based on the results of implementing the ELECTRE method, it can be seen that A1 has an E value of 63.52, so it occupies the first position. In addition, A2 has an E value of 53.74, so it occupies the second position. Also, A3 has an E value of 49.74, occupying the third position. Based on the application of the ELECTRE method, hotels (A1), homestays (A2),  and resorts  (A3) need to optimize the 9P marketing mix (product, price, place, promotion, people, process, physical evidence, performance, partnership) in the process of Segmenting, Targeting, and Positioning for the sustainability of the accommodation service business. However, there is a challenge in this method, which is the integration of subjective preferences of capital owners in the decision-making process using ELECTRE, which can lead to distortion of results due to subjectivity and individual interests.
Perancangan Keamanan Pengguna Cardless dari Ancaman Cyber Crime Menggunakan Kriptografi Curva Elliptic Nevy Bella Samantha; Senie Destya; Wahid Miftahul Ashari
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 7, No 4 (2023): Oktober 2023
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v7i4.6827

Abstract

In this era, technology has discovered new innovations by creating practical ways of making transactions. Cash withdrawal transactions are now much easier because a new way has been discovered, where people can make transactions without using a card. This is certainly very useful for people whose wallets are often left behind. This ease of carrying out transactions is called Cardless. Cardless itself is a cardless cash withdrawal service that offers a fast and time-saving transaction process. Apart from that, cardless cards also have several advantages, including ATM cards being safer from the risk of being swallowed or left behind by the ATM, and avoiding the risk of fraud. Like technology in general created by humans, cardless certainly also has disadvantages. This transaction has the potential for identity theft, uncontrolled spending, system compromise, and not everyone uses cardless cash withdrawal transactions due to lack of socialization of the use of cardless transactions. In this research, the researcher wants to recommend designing additional security in the m-banking application. Different from previous research, this time the researcher used the Elliptic Curve method. The subjects of this research are cardless users. The goal to be achieved in this research is that the security of the m-banking application when using cardless transactions becomes safer because the calculation of the algorithm has been added to randomize or encrypt the PIN. The function of encrypting the PIN itself is aimed at making it more difficult for criminals to successfully carry out crimes. . If the level of security is not added as recommended by the author, the bank will have to think of other ways to increase security when carrying out cardless transactions because then more customers or users will become victims. From the encryption results in this research, the PIN was previously 312143, after the encryption process was carried out, the PIN changed to DUDSDTDSDVDU. Of course, in the future technology will continue to develop and perhaps even bigger flaws will be created, but up to now Elliptic Curve cryptography is still cryptography that is difficult to solve. With so little chance that cybercrime perpetrators can break in.
Penerapan Metode CRISP-DM untuk Optimalisasi Strategi Pemasaran STP (Segmenting, Targeting, Positioning) Layanan Akomodasi Hotel, Homestay, dan Resort Yerik Afrianto Singgalen
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 7, No 4 (2023): Oktober 2023
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v7i4.6896

Abstract

The challenge in maintaining the business continuity of hotel, homestay, and resort accommodation services is the use of technology and marketing methods that are effective and efficient. This study aims to apply the Cross Industry Standard Process for Data Mining (CRISP-DM) method to optimize hotel, homestay, and resort marketing strategies. This research uses case studies on hotel, homestay, and resort accommodation services based on the context of the service provider's business operational area in North Toraja Regency, South Sulawesi Province. The results of this study show that TF-IDF results and sentiment extracts can be utilized for segmenting and targeting processes. Based on the results of TF-IDF, it is known that the main emphasis of hotel, homestay, or resort guests (Toraja Herigate, Toraja Misiliana, Rosaliana Homestay, Hotel Pison, and Luta Resort Toraja) with business operational areas in Rantepao sub-district, North Toraja Regency, South Sulawesi Province, is as follows: staff (97), Rantepao (98), clean (108), breakfast (139), nice (147), rooms (165), toraja (177), good (189),  room (268), hotel (331). In addition, modeling results using the SVM algorithm with SMOTE operators can be used in positioning strategies to improve the competitiveness of accommodation services based on business operational areas. Specifically, the performance of the SVM algorithm using SMOTE operators resulted in an accuracy value of 97.64%, a precision value of 100%, a recall value of 95.37%, an f-measure value of 97.56%, an AUC value of 100%). Compared to the DT algorithm, the performance of SVM algorithms using SMOTE operators has better performance in the classification of review data. Thus, the CRISP-DM method is able to optimize the marketing strategy of hotels, homestays, and resorts.
Penerapan dan Pemantauan Pakan Ikan Lele Otomatis Menggunakan Keypad Shield Berbasis IoT Muhamad Ariandi; Imam Karua
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 7, No 4 (2023): Oktober 2023
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v7i4.6807

Abstract

Cultivating freshwater fish is a promising business in the long term. One type of freshwater fish that is widely cultivated by people is catfish. Catfish is a type of freshwater fish that does not require a lot of care, so it is very profitable and has high economic value. The problem that often occurs in catfish farming is that when feeding fish, farmers are often late in providing fish food, which causes catfish to die and experience cannibalism or eat other species. Based on the problems that occurred, research was carried out at Agrowisata Tekno 44 which aimed to implement an automatic catfish feeding device through the Internet of Things (IoT) based Blynk system which can be controlled using an LCD Keypad Shield which can provide a warning if the feed approaches a predetermined minimum limit. Addition of Mega+Wifi R3 Atmega 2560+ESP 8266 which functions as a link between the automatic fish feed and the Blynk application. The research method used in writing this article is a literature study by comparing the results of ultrasonic sensor measurements with a measuring tool in the form of a vernier caliper, and an interview method with cultivators to obtain information about feeding. Scheduled measurements at a specified time to obtain maximum results, an ultrasonic sensor was added to the fish feed container which functions to determine the contents of the volume of the RTC fish feed container which is used to store time information from the automatic fish feed tool, Push Button to measure the amount feed, the servo motor is used to open and close the fish food container that will exit into the fish pond. Testing the ultrasonic sensor with a vernier caliper to measure the distance that detects fish food in the fish food container produces a measurement ratio with a difference of 0.1 from the comparison between the measurements of the ultrasonic sensor and the vernier caliper. The results of testing carried out for 7 days with automatic fish feeding running according to a predetermined schedule, namely 06.00 and 18.00 with a success rate of 100% accuracy. And the success of the feed weight was 95.6% with an average accuracy of 96%, meaning that the fish did not lack food due to the lack of feed received.
Optimalisasi JST dalam Memprediksi Kunjungan Wisatawan Mancanegara Untuk Perencanaan dan Pengembangan Pariwisata yang Efektif Riki Winanjaya; Harly Okprana
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 7, No 4 (2023): Oktober 2023
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v7i4.6739

Abstract

Foreign tourist predictions assist the government and stakeholders in planning long- and short-term tourism strategies. Accurate information on the estimated number of tourists enables appropriate infrastructure development, efficient budget allocation and setting of relevant policies. Foreign tourists discussed in this study are foreign tourists based in ASEAN countries. This research will utilize historical data on foreign tourist arrivals from the Ministry of Tourism, the Ministry of Law and Human Rights (Directorate General of Immigration) and Mobile Positioning Data. The data that has been obtained will be processed and filtered to obtain relevant and accurate data before being used as input in the creation of an Artificial Neural Network (ANN) model. The algorithm proposed in this study is the Cyclical Rule algorithm with the optimization of the Bayesian Regulation algorithm, which can be used to solve data prediction problems. This study was analyzed using 10 (ten) architectural models, including 4-4-1, 4-5-1, 4-8-1, 4-10-1, 4-12-1, 4-15-1, 4-16-1, 4-20-1, 4-24-1, and 4-25-1. Based on the analysis, the results obtained from the 4-10-1 model with the optimization of the Bayesian Regulation algorithm as the best model with the smallest testing MSE compared to the other models, equal to 0.00786961. Based on the prediction results, foreign tourist arrivals from ASEAN countries in 2023 are expected to decrease compared to 2022. Tourism actors can take advantage of the results of this prediction to improve the quality and quantity of services provided to tourists, as well as adjust the needs of tourists with the resources available at tourist destinations.
Perbandingan Metode ARIMA Box-Jenkins dengan Moving Avarage Untuk Peramalan Harga Emas Desmi Roma Putra Lubis; Ilka Zufria
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 7, No 4 (2023): Oktober 2023
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v7i4.6897

Abstract

Gold is a type of investment that is starting to be popular with many people. Gold price forecasting has an important role for investors and business people in making smart investment decisions. The problem in this research is displaying the price of gold in the market which influences many factors, for example global supply and demand, fluctuating exchange rates, the global situation, and the US dollar exchange rate. And another problem that can be taken up is forecasting gold prices which change from time to time which results in potential losses for investor trading in terms of profit risk in the market. Therefore, it is necessary to create a system that can determine gold price forecasts for investors in the market. uses the Box-Jenkins ARIMA comparison method with precise Moving Average and careful analysis to forecast gold prices. The comparison method is used to determine the trend pattern of the series and provide accurate data, namely the ARIMA Box-Jenkins method, while the Moving Average method determines the movement of the average value to estimate the next value. By calculating the prediction results of the Moving Average and ARIMA, then comparing the accuracy values of ARIMA and Moving Average, we get the accuracy value of ARIMA, namely 98.74% and Moving Average, namely 97.73%. It is known that the difference is not too different, but ARIMA gets the highest accuracy. The role of the application was carried out by conducting research at the H. ST Gold Shop. Martua by collecting gold price data, after the collected data is calculated for coding then entered into an application that has been built using the Moving Average and ARIMA methods.