cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
resolusi@djournals.com
Editorial Address
Jalan Sisingamangaraja No. 338, Simpang Limun, Medan, Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
RESOLUSI : REKAYASA TEKNIK INFORMATIKA DAN INFORMASI
ISSN : -     EISSN : 27457966     DOI : -
Core Subject : Science,
Resolusi : Rekayasa Teknik Informatika dan Informasi, membahas ilmu dibidang Informatika, Sistem Informasi, Manajemen Informatika, DSS, AI, ES, Jaringan, sebagai wadah dalam menuangkan hasil penelitian baik secara konseptual maupun teknis yang berkaitan dengan Teknologi Informatika dan Komputer. Topik utama yang diterbitkan mencakup: 1. Teknik Informatika 2. Sistem Informasi 3. Sistem Pendukung Keputusan 4. Sistem Pakar 5. Kecerdasan Buatan 6. Manajemen Informasi 7. Data Mining 8. Big Data 9. Jaringan Komputer 10. Dan lain-lain (topik lainnya yang berhubungan dengan Teknologi Informasi dan komputer)
Articles 5 Documents
Search results for , issue "Vol. 1 No. 5 (2021): RESOLUSI Mei 2021" : 5 Documents clear
Data Mining Memprediksi Kebutuhan Vaksin Imunisasi dengan Menggunakan Metode Naive Bayes (Studi kasus UPT Puskesmas Teladan) Loria Siburian
Resolusi : Rekayasa Teknik Informatika dan Informasi Vol. 1 No. 5 (2021): RESOLUSI Mei 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Vaccines are medical measures whose aim is to prevent disease, not cure, because vaccines are very important to be given to everyone before they are infected with certain diseases. Vaccines serve to protect the body from attack by foreign organisms such as viruses or bacteria, so the vaccine is given to children during infancy. One of the vaccines given is the BCG or Bacillus Calmette-Guerin vaccine which has a age of 0-2 years, the vaccine given to protect against tuberculosis (TB), an infectious disease that primarily attacks the lungs. Data mining, often called knowledge discovery in database (KDD), is an activity that includes collecting and using historical data to find regularities, patterns or relationships in large data sets. The output of data mining can be used to improve future decision making. Naive Bayes is a simple probabilistic classification that calculates a set of probabilities by summing the frequencies and value combinations from a given dataset. Naive Bayes is based on the simplifying assumption that attribute values ??are conditionally independent of each other when given an output value. In other words, given the output value of the probability of observing together, it is a product of individual probability. The tools used to test are the Tanagra 1.4 software. With this research, it is hoped that it can help the UPT Puskesmas Teladan, especially in predicting the need for the immunization vaccines needed by using the Naive Bayes method to make it even more effective and improve the quality of the health center.
Pengamanan Short Message Service ( SMS ) Menggunakan Algoritma Vibranium Cipher Nifeyani Gulo
Resolusi : Rekayasa Teknik Informatika dan Informasi Vol. 1 No. 5 (2021): RESOLUSI Mei 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Security of SMS (Short Message Service) is one of the activities carried out so that SMS from an undisclosed information cannot be known by other people except those who are given the right to do so. There are several approaches to SMS security techniques that are still used by a number of people today, including by applying cryptographic techniques, steganographic techniques, watermarks and other techniques. A message that is not encoded or encrypted is called plaintext, while a message that has been encoded with a cryptographic algorithm is called ciphertext. . Cryptography is a technique of securing messages by encrypting the contents of the message so that it is safe, while the short message service is a service provided by cellular or Android phones to send and receive messages. The tapping occurs on the communication line, so the SMS text will be very easy to read by tapping, in data encryption, especially the one discussed, namely SMS, there are various algorithms that can be used to secure data, one of which is the vibranium cipher algorithm which uses blocks with a size of 128 bits which can help users to send short messages safely, quickly and easily
Implementasi Metode MD2 Untuk Otentikasi Hasil Scan Citra Ijazah Winda Wulan Sari
Resolusi : Rekayasa Teknik Informatika dan Informasi Vol. 1 No. 5 (2021): RESOLUSI Mei 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A diploma is one of the requirements for someone who wants to apply for a job, but sometimes to getthis, someone can commit fraud by falsifying the contents of the certificate. Forthat we need a system that can provide authentication of a diploma image. This research uses a cryptographic algorithm that will becombined with image processing to ensure the security of an image or certificate. In this study, there is an insertion process and a security process that uses the MD2 method as a medium for solving the implementation of the Authentication of the Ijazah image scan. The results of this study indicate that the authentication application can detect diploma manipulation.
Sistem Pakar Mendiagnosa Penyakit Lupus Menggunakan Metode Constraint Satisfaction Problem (CSP) Jefri Amanda
Resolusi : Rekayasa Teknik Informatika dan Informasi Vol. 1 No. 5 (2021): RESOLUSI Mei 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

At this time the use of computer peripheral technology has grown rapidly among the people. Most people use it not only for commercial purposes, but also to get information about disease detection quickly and efficiently with computer-based applications that can help the general public to find out the causes and symptoms of disease. For this reason, we need a system designed to be able to mimic the expertise of an expert in answering questions and solving problems according to the knowledge of an expert that is incorporated into a computer system. The development of artificial intelligence technology that has occurred has enabled expert systems to be applied in detecting diseases using programming languages. One of them is in providing information about various problems, especially lupus. The expert system method used is the Constraint Satisfaction Problem (CSP) which is used to deal with uncertainties in the diagnosis of lupus.
Sistem Pendukung Keputusan Dalam Menentukan Kelayakan Kredit Pembelian Mobil Dengan Metode TOPSIS Paulus Hendrico Silalahi; Saifullah Saifullah; Irfan Sudahri Damanik
Resolusi : Rekayasa Teknik Informatika dan Informasi Vol. 1 No. 5 (2021): RESOLUSI Mei 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Four-wheeled vehicles become the needs of society is quite important at this time, can be seen from the density of traffic every day. Type of four-wheeled vehicles are also very varied, among others, Honda, Izusu, Toyota, Mazda, and many more, therefore there are still many people who are confused when wanting to buy a car. People who want to buy a car also often ask for help or advice from others to choose what car is suitable for the buy. Many aspects must be considered in buying a car, then people who are often confused to choose because it is faced with the large selection of types of cars in the Sorum. I am here to provide a short solution how to choose a car that according to the will and our individual tastes using the method.

Page 1 of 1 | Total Record : 5