cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
resolusi@djournals.com
Editorial Address
Jalan Sisingamangaraja No. 338, Simpang Limun, Medan, Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
RESOLUSI : REKAYASA TEKNIK INFORMATIKA DAN INFORMASI
ISSN : -     EISSN : 27457966     DOI : -
Core Subject : Science,
Resolusi : Rekayasa Teknik Informatika dan Informasi, membahas ilmu dibidang Informatika, Sistem Informasi, Manajemen Informatika, DSS, AI, ES, Jaringan, sebagai wadah dalam menuangkan hasil penelitian baik secara konseptual maupun teknis yang berkaitan dengan Teknologi Informatika dan Komputer. Topik utama yang diterbitkan mencakup: 1. Teknik Informatika 2. Sistem Informasi 3. Sistem Pendukung Keputusan 4. Sistem Pakar 5. Kecerdasan Buatan 6. Manajemen Informasi 7. Data Mining 8. Big Data 9. Jaringan Komputer 10. Dan lain-lain (topik lainnya yang berhubungan dengan Teknologi Informasi dan komputer)
Articles 5 Documents
Search results for , issue "Vol. 2 No. 5 (2022): RESOLUSI Mei 2022" : 5 Documents clear
Implementasi MD5 dan Paillier Cryptosystem Untuk Membuat Tanda Tangan Digital Benny Sinaga; Muhammad Abdul Rohim; Efori Bu'ulolo
Resolusi : Rekayasa Teknik Informatika dan Informasi Vol. 2 No. 5 (2022): RESOLUSI Mei 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Of the several benefits of cryptographic techniques is data authentication. Before the digital era, signatures were used as a means to prove the authenticity of printed documents such as letters, certificates, certificates, books and so on. Documents that do not have a signature will be doubtful for their authenticity. One of the characteristics of these signatures is that all the signature patterns are the same, so this situation can easily be manipulated with signature forgery, if the related parties use a different signature on each document that is signed it will also have an impact on changing doubts on the parties who are signed. reserves the right to verify. To overcome the need, documents should be given a digital signature. The intended digital signature is not a manual signature that is scanned and then embedded in a digital document. Digital signatures will be built from cryptographic techniques. In this study, the signature that will be used is a signature with a combination of a hash function algorithm and a web-based public-key cryptography. The methods used are the MD5 algorithm and Paillier Cryptosystem. Paillier cryposystem is a public-key cryptographic algorithm which is believed to be difficult to attack because it uses n-residue class calculations so that it will be very difficult to find the key pair used, this is known as the Composite Residuosity (CR) assumption.
Sistem Pendukung Keputusan Untuk Menentukan Tarif Maksimum Kamar Hotel Garuda Plaza Medan Dengan Metode Fuzzy Tsukamoto Wahyu Prismawan; Efori Bu'ulolo; A.M. Hatuaon Sihite
Resolusi : Rekayasa Teknik Informatika dan Informasi Vol. 2 No. 5 (2022): RESOLUSI Mei 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Medan City is a Metropolitan city and also many tourist objects that are currently popular among Indonesians and foreigners. In the hotel industry, the most important thing in determining the hotel rental price is because it only estimates the price of the hotel being rented based on the type of hotel and the facilities provided. Where the problems that occur to consumers do not know the price of the hotel for rent based on the type of hotel room, so that the customer has difficulty in determining the choice of room to use. Based on this problem, Fuzzy Tsukamoto was chosen because it has monotonous reasoning in each of its rules, where each consequent to the rule in the form of IF-THEN must be represented by a fuzzy set with a monotonous membership function. Fuzzy logic is used to solve problems linguistically or variables that contain uncertainty rather than through numbers. The Tsukamoto method has 3 stages, namely; fuzzification, fuzzy inference system, and defuzzification. Fuzzification functions to change crisp values ??to fuzzy values. Fuzzy inference system is drawing conclusions based on fuzzy rules or rules. Defuzzification is the process of converting fuzzy output into crisp values ??using the weighted average concept. In this study the rules will be searched automatically by the system based on the data that has been entered. The data that has been entered will be added with "events" to distinguish holidays, significant price changes, and the like. The results of this study obtained an error using MAPE of 28.41% for the test data with the Studio room type and 27.85% for the test data with the Premiere room type.
Implementasi Algoritma SHA-256 Pada Aplikasi Duplicate Document Scanner Sopiana Nainggolan
Resolusi : Rekayasa Teknik Informatika dan Informasi Vol. 2 No. 5 (2022): RESOLUSI Mei 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

On a computer, if we duplicate a file, the duplicated file is no different from the first file and this can be done in a fairly short time. In this case, what will be duplicated is a word document file with docx extension. SHA (Secure hash Algorithm) is a hash algorithm that is relatively new. The selection of the SHA-256 algorithm is inseparable from several previous studies that have examined the performance of this algorithm. The SHA-256 algorithm is able to detect changes that occur in digital images even though the changes that occur are only 1 pixel, the small differences that occur in the image produce a very significant difference from the hash value with an accuracy level of up to 100%. SHA - 256 produces a message digest with 256 bits in length. SHA - 256 is classified as safe because it is designed in such a way that it is not possible to get messages related to the same message digest.
Implementasi Hue Saturation Value (HSV) Untuk Identifikasi Fraktur Tulang Rita Zahara
Resolusi : Rekayasa Teknik Informatika dan Informasi Vol. 2 No. 5 (2022): RESOLUSI Mei 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Fracture or fracture is a break in the continuity of the bone, most of the fractures occur as a result of trauma, some fractures occur secondary to a disease process such as osteoporosis which causes pathological fractures. The cause of fracture is trauma, which is divided into direct trauma, indirect trauma, and minor trauma. The problem in this research is that the system can be designed to work properly to perform image processing which has shortcomings in the advantages of detection of edge images on bone invoices. Hue is a color known to humans such as red and green, colors that are captured by the human eye based on the wavelength produced. Saturation represents the purity level of the color or the amount of white light mixed with the hue. Each pure color has a saturation value of 100%. Edge detection serves to identify the outline of an object against an overlapping background. Color segmentation is the separation of segments in an image based on the colors contained in the image.
Implementasi Jaringan Saraf Tiruan Dalam Prediksi Penjualan Kue pada UD. Mak Kembar Pematang Siantar Dengan Backpropagation Hendro Sanjaya; Harly Okprana; Bahrudi Efendi Damanik
Resolusi : Rekayasa Teknik Informatika dan Informasi Vol. 2 No. 5 (2022): RESOLUSI Mei 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

UD.Mak Kembar is a shop engaged in the sale of cakes and bread, located in Rambung Merah. Until now, UD. Mak Kembar only uses a simple system in marketing information and recording, causing delays in marketing information and in recording sales calculations. Based on the problems above, the authors design and create a system at UD.Mak Kembar. This system applies predictions in its sales, and is built using an artificial neural network with the Backprogation algorithm. The results obtained with the best architecture 4-5-1 with an iterative process (epoch) during training with an epoch value = 75% and SSE achievement at the time of testing with SSE = 0.23950.

Page 1 of 1 | Total Record : 5