cover
Contact Name
Akim Manaor Hara Pardede
Contact Email
jaiea@ioinformatic.org
Phone
+6281370747777
Journal Mail Official
jaiea@ioinformatic.org
Editorial Address
Jl. Gunung Sinabung Perum. Grand Marcapada Indah. Blok. F1. Kota Binjai. Sumatera Utara
Location
Unknown,
Unknown
INDONESIA
Journal of Artificial Intelligence and Engineering Applications (JAIEA)
Published by Yayasan Kita Menulis
ISSN : -     EISSN : 28084519     DOI : https://doi.org/10.53842/jaiea.v1i1
The Journal of Artificial Intelligence and Engineering Applications (JAIEA) is a peer-reviewed journal. The JAIEA welcomes papers on broad aspects of Artificial Intelligence and Engineering which is an always hot topic to study, but not limited to, cognition and AI applications, engineering applications, mechatronic engineering, medical engineering, chemical engineering, civil engineering, industrial engineering, energy engineering, manufacturing engineering, mechanical engineering, applied sciences, AI and Human Sciences, AI and education, AI and robotics, automated reasoning and inference, case-based reasoning, computer vision, constraint processing, heuristic search, machine learning, multi-agent systems, and natural language processing. Publications in this journal produce reports that can solve problems based on intelligence, which can be proven to be more effective.
Articles 5 Documents
Search results for , issue "Vol. 2 No. 2 (2023): February 2023" : 5 Documents clear
DEVELOPMENT OF HYBRID ENCRYPTION METHOD USING AFFINE CIPHER, VIGENERE CIPHER, AND ELGAMAL ALGORITHM TO SECURE TEXT MESSAGES IN DATA COMMUNICATION SYSTEM RIFDAHTUL GHINAA SINAMBELA; Achmad Fauzi
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 2 (2023): February 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With the development of technological advances in this day and age, it definitely requires a security system on messages and data. The way to maintain the security of data, messages or information requires a branch of science in its application, one of which is the algorithm or cryptography method. In its application, it requires more than one stage of the security process, because data security can be done by combining methods in its security techniques. This research aims to develop encryption methods using Affine Cipher, Vigenere Cipher, and ElGamal Algorithm to secure text messages. Affine cipher, Vigenere cipher and ElGamal are cryptography that can encrypt and decrypt text messages. Encryption is changing the message or plaintext into an unreadable message or ciphertext, on the other hand, decryption changes the ciphertext or message that initially cannot be read into a message that can be read or plaintext back in its original form. The result of this research is the development stage by doing three encryption and decryption processes. For the first encryption process using Affine Chiper which produces the initial ciphertext, then re-encrypted using Vigenere Cipher, then the previous encryption results are carried out ElGamal encryption which produces the final ciphertext. Conversely, the decryption process is first on ElGamal, then Vigenere Cipher, and finally Affine Cipher whose decryption results in plaintext back in the form of the initial text message. So that by developing and combining three algorithm methods can increase the security of information and text messages.
A Decision Support System To Determine The Location Of A New Sales Branch At Star East Shop With The Smart Method Ahmad Nawawi; Suci Ramadhani; Anton Sihombing
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 2 (2023): February 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In a business world that is always dynamic and full of competition, business people must always think of ways to continue to survive and if possible develop their business scale in order to meet these business needs, there are many ways that can be taken, one of which is by conducting data analysis. . Bintang Timur shop is one of the businesses in the field of iron and building material shops in the city of stabat. Bintang Timur shop was founded in 2013 which continues to grow at this time. Equipped with the desire to meet the needs of users in the field of iron and building, Bintang Timur store continues to grow by adding various products. The profits obtained in this shop are also used to develop the business, one of which is the addition of goods sold. Based on the analysis that has been done, there are several obstacles faced by this eastern star shop. One of them is the process of finding a new sales branch location at the Bintang Timur store. In this study, a Decision Support System (DSS) will be built using the Simple Multiple Attribute Rating Technique (SMART) method which is a multi-criteria decision making technique based on each alternative consisting of of a number of criteria that have a value and each criterion. Based on the calculation results of the SMART method above, Tebasan (A1) is a new branch location at the Bintang Timur Store in Stabat City which is feasible with a value of 0.763.
Identification Identification of land and water Centella asiatica leaf herbal plants using digital imagery with the Sobel Edge Detection algorithm I Gusti Prahmana; Kristina Annatasia Br Sitepu
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 2 (2023): February 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Centella asiatica leaves or gotu kola leaves are wild plants that grow in Asian countries such as China, Indonesia, Japan and India. Since thousands of years ago, this gotu kola leaf has been known to treat various diseases. This plant is even used as a traditional herbal medicine in China and India. Centella asiatica is an annual herbaceous plant that grows and flowers throughout the year. Plants will thrive if the soil and environment are suitable to be used as a ground cover. Types of gotu kola that are often found are red gotu kola and green gotu kola. Centella asiatica is also known as antanan taman or antanan batu because it is found in rocky, dry and open areas. Centella asiatica grows with stolons and has no stems, but has rhizomes (short rhizomes). Meanwhile, green gotu kola is often found in rice fields and on the sidelines of the grass. Based on this problem, a study is needed to develop a system to determine the shape of leaf fiber density with a comparison of ground gotu kola and water gotu kola using image processing techniques to find the diameter. This measurement process uses the Matlab application and tests with the Sobel edge detection method and image processing to see edges that are more clearly visible. The results showed that the developed system was capable of obtaining images and identifying the fiber density of Centella asiatica leaves. The system was designed with Jupyter Notebook Python-based programming language analysis with image data taken via internet sources as research material.
IMPLEMENTATION OF THE SPIRAL METHOD FOR ANALYZING AND DESIGNING FINANCIAL INFORMATION SYSTEMS AND FINANCIAL ARCHIVES FOR CASHIER FINANCIAL MANAGEMENT SECTION (CASH INFORMATION REPLACEMENT) Muammar Khadapi
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 2 (2023): February 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This title is backgrounded by financial management employees in the PT Telekomunikasi Indonesia.Tbk Cooperative in the form of Application.There are many problems happened such as the data did not saved well and the financial data was mixed with the other archive. The purpose of this research is to build a cashier application system which will enumerate employees in its financial arrangement, both income and from the cooperative and then become a file which is computerized will facilitate the employees. The methods which is used in this application development method is Spiral. It is the systematic approach and sequentially to software, start from users’ specification necessary until the planning, modeling, construction, and deployment. After analyzing the problems that occur then made the improvement to the current problem by build an application that supports web-based financial processes.
A Review: Design and Build Damage Detection Equipment on Sensors and Power Supply Automatic Rain Gauge (ARG) With Long Short Term Memory Integrated marzuki sinambela
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 2 No. 2 (2023): February 2023
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The Meteorology, Climatology, and Geophysics Agency (BMKG) technicians have successfully developed automatic rain measuring devices. This tool is called Automatic Rain Gauge - BMKG (ARG-BMKG). The existence of this instrument can replace conventional rain measuring observation systems or public rain stations in Indonesia. ARG – BMKG consists of a tipping bucket sensor, solar panels, GPRS modem, dry battery, and data logger. This repeated operation causes sensor measurement errors due to damage to the sensor due to the sensor voltage supply not meeting specifications, resulting in inaccurate data sent. Predicting sensor damage can be done with predictive maintenance. The results of field tests in previous studies showed that the system could operate properly where the device could measure the voltage of each sensor and send data to the database A sensor damage prediction model was designed and implemented using long-sort term memory (LSTM) by generating root mean square error (rmse). The system can provide damage prediction information on the sensor, and the power supply is displayed through the website properly

Page 1 of 1 | Total Record : 5